Rhetorical Moves and Identity Performance in Online Child Sexual Abuse Interactions

Total Page:16

File Type:pdf, Size:1020Kb

Rhetorical Moves and Identity Performance in Online Child Sexual Abuse Interactions Some pages of this thesis may have been removed for copyright restrictions. If you have discovered material in Aston Research Explorer which is unlawful e.g. breaches copyright, (either yours or that of a third party) or any other law, including but not limited to those relating to patent, trademark, confidentiality, data protection, obscenity, defamation, libel, then please read our Takedown policy and contact the service immediately ([email protected]) Rhetorical moves and identity performance in online child sexual abuse interactions Volume One Emily Alice Chiang Doctor of Philosophy Centre for Forensic Linguistics Aston University September, 2018 © Emily Alice Chiang, 2018, asserts her moral right to be identified as the author of this thesis. This copy of the thesis has been supplied on condition that anyone who consults it is understood to recognise that its copyright belongs to its author and that no quotation from the thesis and no information derived from it may be published without appropriate permission or acknowledgement. !1 Centre for Forensic Linguistics Aston University Rhetorical moves and identity performance in online child sexual abuse interactions Emily Chiang Doctor of Philosophy 2018 Thesis Summary Online child sexual abuse (OCSA) is a pervasive problem facilitated by the anonymity afforded to offenders online. From a largely social constructionist perspective, this thesis explores linguistic expressions of identity by participants across a range of OCSA interactions, including offenders and suspected offenders, victims, and undercover police officers. The thesis is structured around three individual studies, each involving a different abusive interaction type. Each study employs Swales’ (1981; 1990) move analysis framework, exploring how participants use rhetorical moves as a resource for identity performance. Study 1 concerns a convicted offender who strategically cycled through numerous adopted personas when interacting with victims online. It considers his performance of various identity positions through his use of rhetorical moves across different personas. One persona is found to diverge significantly from the rest, and is identified as a possible reflection of the offender’s ‘home identity’. Study 2 considers interactions between suspected offenders and undercover police officers posing as offenders. It compares the participants’ move use and explores linguistic realisations of supportive exchanges, finding that aside a few notable differences, undercover officers perform the offender identity similarly to genuine suspected offenders. Study 3 explores dark web forum posts authored by ‘newbies’ attempting to join existing online communities of suspected offenders. It examines the identity positions performed in the posts and considers how positions of competence and expertise contribute to the persuasive process of seeking membership into online offending communities. Taking findings from these studies, the thesis discusses the possible contributions of move analysis to OCSA research and how rhetorical moves are used as a resource for identity performance, and offers an approach to identity analysis based on rhetorical moves. It concludes by arguing for move analysis as a useful goal-centred approach to identity investigation and describes potential implications of this work for law-enforcement, education and research. KEY WORDS: online child sexual abuse, identity, move analysis, rhetorical move, strategies !2 Acknowledgements Writing this thesis has felt at times arduous, but overall it’s been an immensely enjoyable experience. First and foremost I would like to thank my supervisors, Tim Grant and Carol Marley, for their unfailing support over the past three years. Special thanks to Tim, whose advice, guidance and answers to sometimes strange questions somehow managed to make the process only half as difficult and scary as it could have been. It needs acknowledging that this work could not have been carried out without the support of the UK police force who provided the data for the project; thank you not just for the data but also for your support for the field of forensic linguistics and your openness to collaborative work and exploratory approaches. Thanks also to everyone at the CFL. When embarking on a PhD, you get told to prepare for a lonely and isolated experience. I am lucky to say I didn’t experience this once, and that is purely down to my CFL family. I would also like to thank my friends outside of the CFL, who have dutifully listened to my incoherent ramblings about linguistic moves, as well as allowed me to escape my work whenever I needed to. Finally, I am most grateful to my family, in particular my parents, Stephen and Emma Chiang, my brother, Toby Chiang, and my husband, Kevin Carmody. Thanks to my parents for their unfaltering encouragement and support, and for never asking when I’m going to get a real job (soon, I promise!). Thanks to Toby for the thoughtful comments and feedback (and for actually reading the entire thesis - seriously, I owe you one!). And special thanks to Kevin, first for the tech support, but mostly for everything else. This thesis is dedicated to you. !3 Table of contents Volume one Chapter 1: Introduction .......................................................................17 Online child sexual abuse............................................................................................. 17 Aims and research questions....................................................................................... 19 Thesis structure............................................................................................................. 21 Originality and implications.......................................................................................... 23 Chapter 2: Online child sexual abuse and linguistic contributions to the literature .........................................................................................24 Introduction.................................................................................................................... 24 Prevalence .....................................................................................................................25 Offenders and victims................................................................................................... 28 Online offender typologies............................................................................... 28 Victim characteristics....................................................................................... 29 Stereotypes...................................................................................................... 30 Internet and technology affordances........................................................................... 31 Combative measures ....................................................................................................35 Legislation .......................................................................................................35 Covert investigations....................................................................................... 36 Education......................................................................................................... 38 Technology....................................................................................................... 39 Online grooming ...........................................................................................................41 Definitions and terminology............................................................................. 41 Process and characteristics ............................................................................44 Linguistic research........................................................................................................ 46 Conclusion...................................................................................................................... 53 Chapter 3: Language and identity in online child sexual abuse interactions............................................................................................ 54 Introduction.................................................................................................................... 54 From essentialism to constructionism........................................................................ 55 The interactional model................................................................................................. 57 Emergence and positionality........................................................................... 58 Indexicality....................................................................................................... 60 Relationality..................................................................................................... 66 !4 Partialness....................................................................................................... 68 Retaining essentialism.................................................................................................. 70 Identity in the current research ...................................................................................73 The resource-constraint model........................................................................ 73 The hierarchy of identities model..................................................................... 75 Conclusion.....................................................................................................................
Recommended publications
  • World of Warcraft Online Manual
    Game Experience May Change During Online Play WOWz 9/11/04 4:02 PM Page 2 Copyright ©2004 by Blizzard Entertainment. All rights reserved. The use of this software product is subject to the terms of the enclosed End User License Agreement. You must accept the End User License Agreement before you can use the product. Use of World of Warcraft, is subject to your acceptance of the World of Warcraft® Terms of Use Agreement. World of Warcraft, Warcraft and Blizzard Entertainment are trademarks or registered trademarks of Blizzard Entertainment in the U.S. and/or other countries.Windows and DirectX are trademarks or registered trademarks of Microsoft Corporation in the U.S. and/or other countries. Pentium is a registered trademark of Intel Corporation. Power Macintosh is a registered trademark of Apple Computer, Inc. Dolby and the double-D symbol are trademarks of Dolby Laboratory. Monotype is a trademark of Agfa Monotype Limited registered in the U.S. Patent and Trademark ® Office and certain other jurisdictions. Arial is a trademark of The Monotype Corporation registered in the U.S. Patent and Trademark Office and certain other jurisdictions. ITC Friz Quadrata is a trademark of The International Typeface Corporation which may be registered in certain jurisdictions. All other trademarks are the property of their respective owners. Uses high-quality DivX® Video. DivX® and the DivX® Video logo are trademarks of DivXNetworks, Inc. and are used under license. All rights reserved. AMD, the AMD logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc All ATI product and product feature names and logos, including ATI, the ATI Logo, and RADEON are trademarks and / or registered trademarks of ATI Technologies Inc.
    [Show full text]
  • University of Dundee the Origins of the Jimmy Savile Scandal Smith, Mark
    University of Dundee The origins of the Jimmy Savile scandal Smith, Mark; Burnett, Ros Published in: International Journal of Sociology and Social Policy DOI: 10.1108/IJSSP-03-2017-0029 Publication date: 2018 Document Version Peer reviewed version Link to publication in Discovery Research Portal Citation for published version (APA): Smith, M., & Burnett, R. (2018). The origins of the Jimmy Savile scandal. International Journal of Sociology and Social Policy, 38(1/2), 26-40. https://doi.org/10.1108/IJSSP-03-2017-0029 General rights Copyright and moral rights for the publications made accessible in Discovery Research Portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. • Users may download and print one copy of any publication from Discovery Research Portal for the purpose of private study or research. • You may not further distribute the material or use it for any profit-making activity or commercial gain. • You may freely distribute the URL identifying the publication in the public portal. Take down policy If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. Download date: 25. Sep. 2021 The origins of the Jimmy Savile Scandal Dr Mark Smith, University of Edinburgh (Professor of Social Work, University of Dundee from September 2017) Dr Ros Burnett, University of Oxford Abstract Purpose The purpose of this paper is to explore the origins of the Jimmy Savile Scandal in which the former BBC entertainer was accused of a series of sexual offences after his death in 2011.
    [Show full text]
  • Sexual Subversives Or Lonely Losers? Discourses of Resistance And
    SEXUAL SUBVERSIVES OR LONELY LOSERS? DISCOURSES OF RESISTANCE AND CONTAINMENT IN WOMEN’S USE OF MALE HOMOEROTIC MEDIA by Nicole Susann Cormier Bachelor of Arts, Psychology, University of British Columbia: Okanagan, 2007 Master of Arts, Psychology, Ryerson University, 2010 A dissertation presented to Ryerson University In partial fulfillment of the requirements for the degree of Doctor of Philosophy In the program of Psychology Toronto, Ontario, Canada, 2019 © Nicole Cormier, 2019 AUTHOR’S DECLARATION FOR ELECTRONIC SUBMISSION OF A DISSERTATION I hereby declare that I am the sole author of this dissertation. This is a true copy of the dissertation, including any required final revisions, as accepted by my examiners. I authorize Ryerson University to lend this dissertation to other institutions or individuals for the purpose of scholarly research. I further authorize Ryerson University to reproduce this dissertation by photocopying or by other means, in total or in part, at the request of other institutions or individuals for the purpose of scholarly research. I understand that my dissertation may be made electronically available to the public. ii Abstract Title: Sexual Subversives or Lonely Losers? Discourses of Resistance and Containment in Women’s Use of Male Homoerotic Media Doctor of Philosophy, 2019 Nicole Cormier, Clinical Psychology, Ryerson University Very little academic work to date has investigated women’s use of male homoerotic media (for notable exceptions, see Marks, 1996; McCutcheon & Bishop, 2015; Neville, 2015; Ramsay, 2017; Salmon & Symons, 2004). The purpose of this dissertation is to examine the potential role of male homoerotic media, including gay pornography, slash fiction, and Yaoi, in facilitating women’s sexual desire, fantasy, and subjectivity – and the ways in which this expansion is circumscribed by dominant discourses regulating women’s gendered and sexual subjectivities.
    [Show full text]
  • Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries
    Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries McAlinden, A-M. (2018). Organisational Sex Offenders and 'Institutional Grooming': Lessons from the Savile and Other Inquiries. In M. Erooga (Ed.), Protecting Children and Adults from Abuse After Savile: What Organizations and Institutions Need to do London: Jessica Kingsley Publishers. Published in: Protecting Children and Adults from Abuse After Savile: What Organizations and Institutions Need to do Document Version: Peer reviewed version Queen's University Belfast - Research Portal: Link to publication record in Queen's University Belfast Research Portal Publisher rights © 2018 Jessica Kingsley Publishing.This work is made available online in accordance with the publisher’s policies. Please refer to any applicable terms of use of the publisher. General rights Copyright for the publications made accessible via the Queen's University Belfast Research Portal is retained by the author(s) and / or other copyright owners and it is a condition of accessing these publications that users recognise and abide by the legal requirements associated with these rights. Take down policy The Research Portal is Queen's institutional repository that provides access to Queen's research output. Every effort has been made to ensure that content in the Research Portal does not infringe any person's rights, or applicable UK laws. If you discover content in the Research Portal that you believe breaches copyright or violates any law, please contact [email protected]. Download date:28. Sep. 2021 FINAL AUTHOR VERSION: McAlinden, A.-M. (2018), ‘Organisational Sex Offenders and “Institutional Grooming’: Lessons from the Savile and Other Inquiries’, in M.
    [Show full text]
  • AOL Offers Video Chat with No Log-In, Download 13 May 2011, by RACHEL METZ , AP Technology Writer
    AOL offers video chat with no log-in, download 13 May 2011, By RACHEL METZ , AP Technology Writer In a move to become more competitive in the fast- AV's release comes two days after Microsoft Corp. growing field of video chat, the team behind AOL said it would pay $8.5 billion for popular Internet Inc.'s AIM instant messenger rolled out the first phone service Skype, which allows people to make version of a free video chat service on Thursday free and cheap voice and video calls. that doesn't require users to log in or download any software. ©2011 The Associated Press. All rights reserved. This material may not be published, broadcast, Called AV, the service was created as a way to rewritten or redistributed. have quick, easy video chats, Jason Shellen, a leader of the AIM team, said. Though there are plenty of other voice and video chat offerings available for computers and smartphones, AV is unlike many with its decision to eschew both logins and software downloads. In order to start a chat, a user gets a unique link from AV and sends it to friends. Once a friend with a webcam clicks on the link, a chat window will pop up on the screen and show live video of the user who started the chat session and any other participants. Up to four people can be involved in a chat at once, Shellen said. The service has several features, such as the ability to type messages to individual users while video chatting - to send a link to a webpage, for example.
    [Show full text]
  • Sexual Violence in the Media: Portrayals and Prevention
    Sexual violence in the media: Portrayals and prevention Dr Jessica Taylor Special thanks to all peer reviewers of this publication VictimFocus Publications © 2020 Free copies from this report and others can be obtained using contact details below: Web: www.victimfocus.org.uk Resources store: www.victimfocus-resources.com Email: [email protected] 2 Content An introduction to the role of the media 4 Dominant messages: The sexualisation, pornification and objectification of 5 women and girls The effect of pornography and porn culture 9 Victim blaming, rape myths and misogyny 13 Examples of sexual violence prevention posters used in the UK 19 Recommendations for improving sexual violence prevention 23 Reference List 25 3 An introduction to the role of media The mass media now includes television, radio, internet and printed communications and is intended to reach the majority of the general public. Every day, an individual now spends more time engaging with mass media outlets through technology than sleeping. Ofcom (2014) reported that people in Britain spend an average of 8 hours and 40 minutes per day accessing media in comparison to only sleeping for an average of 8 hours and 20 minutes per day. With individuals relying heavily on media for information about social and political issues, pop culture, product information and general news, it is easy to see the power that these outlets have when it comes to presenting messages about sexual violence (Shaw et al., 2009). Even studies from the early eighties and nineties found that large proportions of children’s prime time television dramas contained sexual imagery, kissing, flirting and discussion of sex and intimacy (Cope-Farrar & Kunkel, 2011).
    [Show full text]
  • Practice Case Review 12: Jimmy Savile
    All Wales Basic Safeguarding Practice Reviews Awareness Training Version 2 Practice case review 12: Jimmy Savile Sir Jimmy Savile who died in 2011 at 84 years-old was a well-known radio and television personality who came to public attention as an eccentric radio DJ in the 1960’s. At the time of his death he was respected for his charitable work having been knighted in 1990. He was closely associated with Stoke Mandeville and St James Hospitals. In the year following his death allegations were These reports looked at the various factors that being made about his sexual conduct, as these contributed to the decisions to take no action. gained publicity more individuals came forward to One report concluded that there had been an add their own experiences to a growing list. A ‘over-reliance on personal friendships between pattern of behaviour began to emerge and the Savile and some officers’. Police launched formal criminal investigation into The Health Minister Jeremy Hunt launched an allegations of historical sexual abuse. investigation into Savile’s activities within the NHS, Operation Yewtree commenced in October 2012 barrister Kate Lampard was appointed as the head and the Metropolitan Police Service concluded of this investigation which by November 2013 had that up to 450 people had alleged abuse by Savile. included thirty two NHS hospitals. A report into the findings of this criminal The findings of this investigation, published in investigation published jointly by the Police and June 2014 focussed on the following areas: The NSPCC called ‘Giving Victims a Voice’ found that abuse by Savile spanned a 50 year period and • security and access arrangements, including involved children as young as eight years-old.
    [Show full text]
  • Harmful Effects of Pornography 2016 Reference Guide
    Harmful Effects of Pornography 2016 Reference Guide fightthenewdrug.org COPYRIGHT © 2015 by Fight the New Drug, Inc. ALL RIGHTS RESERVED A certified resource of Fight the New Drug. Fight the New Drug is a 501(c)(3) Non-Profit and was established in March 2009. Please email [email protected] or call us at 385.313.8629 with any questions. Heart — 2.1 How Pornography Warps Expectations.................................................41 2.2 How Pornography Warps Expectations of Sex......................................44 2.3 How Pornography Impacts Partner’s Mental & Emotional Health ......................................46 2.4 How Pornography Changes Perceptions of Partners ................................49 2.5 How Pornography Influences Contents Acquired Sexual Tastes .................................51 2.6 How Pornography Impacts Sexual Intimacy ........................................... 53 2.7 How Pornography Impacts Relationships & Families .............................. 55 Brain 2.8 How Pornography Encourages Objectification ........................................... 58 — 2.9 How Pornography Use Decreases 1.1 Understanding the Brain’s Interest in Actual Partners Reward Center ............................................. 3 & Actual Sex ............................................... 59 1.2 How Pornography Alters 2.10 How Pornography Can Lead Sexual Tastes ................................................. 5 to Physical Danger for Partners .................... 60 1.3 Pornography Induced Erectile Dysfunction (ED) ...........................................
    [Show full text]
  • Massively Multiplayer Online Role Playing Game Chat Project
    [Massively Multiplayer Online Role Playing Game Chat] 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 1/21/2016 http://www.lcdi.champlain.edu Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................ 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................. 3 Research Questions: ...........................................................................................................................................................
    [Show full text]
  • Constructing Pornography Addiction's Harms in Science, News Media
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Sociology Department, Faculty Publications Sociology, Department of 2021 Constructing Pornography Addiction’s Harms in Science, News Media, and Politics Kelsy Burke Alice MillerMacPhee Follow this and additional works at: https://digitalcommons.unl.edu/sociologyfacpub Part of the Family, Life Course, and Society Commons, and the Social Psychology and Interaction Commons This Article is brought to you for free and open access by the Sociology, Department of at DigitalCommons@University of Nebraska - Lincoln. It has been accepted for inclusion in Sociology Department, Faculty Publications by an authorized administrator of DigitalCommons@University of Nebraska - Lincoln. digitalcommons.unl.edu Constructing Pornography Addiction’s Harms in Science, News Media, and Politics Kelsy Burke & Alice MillerMacPhee University of Nebraska-Lincoln Correspondence — Kelsy Burke, Department of Sociology, University of Nebraska-Lincoln, 742 Oldfather Hall, Lincoln, NE 68588-0324, USA; e-mail: [email protected]. Abstract In order to describe pornography’s harms in the twenty-first century, an age of un- precedented access to Internet technology, some advocates—including activists, re- ligious leaders, politicians, and scientists—use a medical/scientific framework to claim that pornography is biologically addictive. This article examines public dis- course on “pornography addiction” to extend theories of sociology of science and sociology of sexualities about scientific knowledge and the biomedicalization of sex and sexuality. Using content analysis of over 600 documents, including scientific studies, newspaper articles, and state government resolutions, we show how ref- erences to pornography as addictive emerged in the twenty-first century and grew most substantially in the last decade.
    [Show full text]
  • 2011 State of Sexual Freedom Report
    State of Sexual Freedom in the United States 2011 Report WOODHULL SEXUAL FREEDOM ALLIANCE WOODHULL SEXUAL FREEDOM ALLIANCE Copyright 2011 by Woodhull Sexual Freedom Alliance www.woodhullalliance.org All rights reserved. The views expressed are those of the authors and do not necessarily represent those of the Woodhull Sexual Freedom Alliance; of its directors, officers, or staff; or of its funders. Acknowlegements A Woodhull Sexual Freedom Alliance Report Affirming Sexual Freedom as a Fundamental Human Right We gratefully acknowledge those individuals and organizations who contributed to the State of Sexual Freedom in the United States, 2011 Report Diana Adams Ricci Levy Megan Andelloux Aida Manduley Steven K. Aurand Susan Milstein Ted Bernhardt Jeffrey Montgomery J. Dennis Fortenberry National Health Statistics Alicia Gauvin Melanie Rowen Todd Heywood Liam Stansen International Planned Parenthood Carmen Vazquez Kate Kendell Lawrence G. Walters Mark Kerns Elizabeth Wood Marty Klein Rebecca Zakarian Steven K. Aurand – Editor Elizabeth A. Wood – Editor Elizabeth Stewart – Cover Illustration William Whitehead – Production Contents FOREWORD ..............................................................................................................................................................................................................................................................................................................i Our Fundamental Human Right to Sexual Freedom and the State of Sexual Freedom in the United States, 2011
    [Show full text]
  • Teen Sexting THINK TWICE Before You Hit "Send"
    Teen Sexting THINK TWICE before you hit "send" ? Male and female teens IN WHAT IS sext at the 7 10 SEXTING? same rate. Sending or getting sexually explicit photos, videos, or Roughly 7 in 10 youth But females are messages through have felt some ? more pressured pressure to sext for your cellphone to sext. or online. reasons like making their romantic partner happy or getting someone's attention. HOW MANY TEENS SEXT? 15% I've sent a sext. 27% 12% I've received a sext. I've sent a sext from someone else without asking permission. WHY IS IT RISKY? Sexting can have legal Online photos Sexts can be used consequences like child live forever and to hurt you and pornography charges or can get into the be shared without having to register as a wrong hands. your consent. sex offender. HOW CAN I PREVENT IT ? "I don't think that would be good for us." Protect yourself and others by not taking sexually explicit pictures or videos. "I'd rather do other things with you." Speak up when someone makes you uncomfortable with their "I'm not ready texts or what they send you. for that yet." Respect others by not pressuring them to sext you. I RECEIVED OR SENT A SEXT. NOW WHAT? Delete the picture or video. Share your concerns with a Report a sext that was sent parent or trusted adult. to you or shared without your consent to the Cyber Tip Line. To report an explicit image or video: Call the Cyber Tip Line (800) 843-5678 or visit https://report.cybertip.org/ To remove sexual pictures and videos from the internet: Visit http://www.missingkids.com/gethelpnow/is-your-explicit-image-out-there- Visit https://cdn.netsmartz.org/tipsheets/You_Sent_A_Sext_Now_What.pdf To learn more about your safety and how to deal with sexting: Visit https://cyberbullying.org/sexting-advice-for-teens.pdf Click to Visit https://cdn.netsmartz.org/tipsheets/sexting.pdf learn more SOURCES Connect Safely.
    [Show full text]