This article presents a case study examining the performance of the offender identity in online child sexual abuse interactions between genuine suspected offenders and an undercover officer posing as an offender. Using a linguistic framework known as move analysis, the study describes and compares interactants' use of rhetorical moves, as well as move frequencies and structures. Similarities and differences in the performance of offenderness between suspected offenders and the undercover police officer are discussed. Interactions are characterised by a high level of rapport-building, sharing stories, and exchanging support. While the undercover officer largely emulates the moves of suspected offenders, key discrepancies include his comparat...
This exploratory study aimed to examine online communications between contact reality and non-contac...
Public reactions to internet child offending remains ambivalent in that, whilst there is vocal conde...
As the range of cybercrimes expands, law enforcement agencies develop new strategies for their inves...
This article presents a case study examining the performance of the offender identity in online chil...
Child sexual offenders convene in dark web spaces to exchange indecent imagery, advice and support. ...
This article provides a case study of deceptive online identity performance by a convicted child sex...
Online child sexual abuse (OCSA) is a pervasive problem facilitated by the anonymity afforded to off...
Forensic linguistics is at the cutting edge of the undercover policing of child sexual abuse on the ...
One way in which linguists have been able to offer their expertise to undercover online policing in ...
One way in which linguists have been able to offer their expertise to undercover online policing in ...
Abstract This paper explores the extent and effectiveness of proactive investigations in which inves...
This study seeks to understand and explain the problem of online child sexual abuse (CSA). More spec...
Transcripts of chat logs of naturally-occurring, sexually exploitative interactions between offender...
This exploratory study aimed to examine online communications between contact reality and non-contac...
Public reactions to internet child offending remain ambivalent in that, while there is vocal condemn...
This exploratory study aimed to examine online communications between contact reality and non-contac...
Public reactions to internet child offending remains ambivalent in that, whilst there is vocal conde...
As the range of cybercrimes expands, law enforcement agencies develop new strategies for their inves...
This article presents a case study examining the performance of the offender identity in online chil...
Child sexual offenders convene in dark web spaces to exchange indecent imagery, advice and support. ...
This article provides a case study of deceptive online identity performance by a convicted child sex...
Online child sexual abuse (OCSA) is a pervasive problem facilitated by the anonymity afforded to off...
Forensic linguistics is at the cutting edge of the undercover policing of child sexual abuse on the ...
One way in which linguists have been able to offer their expertise to undercover online policing in ...
One way in which linguists have been able to offer their expertise to undercover online policing in ...
Abstract This paper explores the extent and effectiveness of proactive investigations in which inves...
This study seeks to understand and explain the problem of online child sexual abuse (CSA). More spec...
Transcripts of chat logs of naturally-occurring, sexually exploitative interactions between offender...
This exploratory study aimed to examine online communications between contact reality and non-contac...
Public reactions to internet child offending remain ambivalent in that, while there is vocal condemn...
This exploratory study aimed to examine online communications between contact reality and non-contac...
Public reactions to internet child offending remains ambivalent in that, whilst there is vocal conde...
As the range of cybercrimes expands, law enforcement agencies develop new strategies for their inves...