|
|
x | |
|
|
xi | |
Preface |
|
xiii | |
Acknowledgements |
|
xvi | |
|
|
xvii | |
|
|
xviii | |
|
|
1 | (25) |
|
|
1 | (3) |
|
Online Child Sexual Abuse |
|
|
4 | (2) |
|
|
6 | (2) |
|
|
8 | (2) |
|
Can You Be Whomever You Want? |
|
|
10 | (5) |
|
Understandings of Language and Identity |
|
|
15 | (1) |
|
Forensic Linguistics and the Interest in Idiolect |
|
|
15 | (1) |
|
Language as Identity Performance |
|
|
16 | (5) |
|
Identity Performance Online |
|
|
21 | (1) |
|
A Sketch of a Resource-Constraint Theory of Identity |
|
|
22 | (4) |
|
|
26 | (32) |
|
|
27 | (1) |
|
|
27 | (1) |
|
|
28 | (1) |
|
|
29 | (2) |
|
|
31 | (1) |
|
|
32 | (3) |
|
|
35 | (1) |
|
Methodological Approaches |
|
|
35 | (2) |
|
|
37 | (3) |
|
|
40 | (3) |
|
|
43 | (7) |
|
Social Behaviour Analysis |
|
|
50 | (2) |
|
|
52 | (1) |
|
|
52 | (2) |
|
|
54 | (4) |
|
|
58 | (32) |
|
|
58 | (1) |
|
Identify and Variation in IM |
|
|
59 | (1) |
|
Variation in Structural Features |
|
|
60 | (2) |
|
Variation in Pragmatic Features |
|
|
62 | (1) |
|
Variation in Interactional Features |
|
|
63 | (2) |
|
Variation in Social Features |
|
|
65 | (1) |
|
Variation and Identity in IM: Conclusions |
|
|
66 | (1) |
|
|
66 | (1) |
|
|
66 | (1) |
|
`Naive' Identity Disguise: Experimental Results |
|
|
67 | (21) |
|
|
88 | (2) |
|
4 Training Identity Assumption |
|
|
90 | (24) |
|
|
90 | (3) |
|
|
93 | (1) |
|
|
94 | (2) |
|
|
96 | (1) |
|
Lexical and Morphological Analysis of the Target Persona |
|
|
96 | (3) |
|
Structural Level Performance Pre- and Post-Training |
|
|
99 | (3) |
|
|
102 | (1) |
|
Speech Act Analysis of the Target Persona |
|
|
102 | (3) |
|
Speech Act Performance Pre- and Post-Training |
|
|
105 | (2) |
|
|
107 | (1) |
|
Topic Development and Control by the Target Persona |
|
|
107 | (2) |
|
Topic Analysis of the Pre-training Chats |
|
|
109 | (1) |
|
Topic Analysis of the Post-Training Chats |
|
|
110 | (1) |
|
|
110 | (2) |
|
|
112 | (2) |
|
5 Resources and Constraints in Abuse Identity Performance |
|
|
114 | (27) |
|
Language and Identity Revisited |
|
|
114 | (2) |
|
Online Communities of Practice and the Linguistic Individual |
|
|
116 | (2) |
|
Exploring Identity Resources in IM and Dark Web Chat Rooms |
|
|
118 | (1) |
|
Aspects of Performed Identity |
|
|
119 | (11) |
|
Abuse Communities of Practice |
|
|
130 | (7) |
|
|
137 | (4) |
|
6 Contexts for Linguistic Investigative Advice |
|
|
141 | (25) |
|
Evidencing That an Anonymous Writer Is a Known Author |
|
|
142 | (1) |
|
|
142 | (6) |
|
The Uses of Comparative Authorship Analysis in Online Crime |
|
|
148 | (5) |
|
The Aim and Purpose of Comparative Authorship Analysis |
|
|
153 | (1) |
|
Author Search and Sociolinguistic Profiling |
|
|
154 | (1) |
|
The Purpose of Sociolinguistic Profiling |
|
|
154 | (6) |
|
Assuming the Identity of an Online Writer |
|
|
160 | (2) |
|
The Purposes of Police Undercover Authorship Synthesis |
|
|
162 | (2) |
|
|
164 | (2) |
|
7 Implications and Future Directions |
|
|
166 | (15) |
|
|
166 | (1) |
|
Implications for Supporting Operations |
|
|
167 | (5) |
|
Implications for Forensic Authorship Analysis |
|
|
172 | (3) |
|
Implications for Theorising Identity |
|
|
175 | (3) |
|
|
178 | (3) |
References |
|
181 | (12) |
Index |
|
193 | |