Deceptive identity performance: Offender moves and multiple identities in online child abuse conversations

Research output: Contribution to journalArticlepeer-review

Abstract

This article provides a case study of deceptive online identity performance by a convicted child sex offender. Most prior linguistic and psychological research into online sexual abuse analyses transcripts involving adult decoys posing as children. In contrast, our data comprise genuine online conversations between the offender and 20 victims. Using move analysis (Swales 1981, 1990), we explore the offender’s numerous presented personas. The offender’s use of rhetorical moves is investigated, as is the extent to which the frequency and structure of these moves contribute to and discriminate between the various online personas he adopts. We find from eight frequently adopted personas that two divergent identity positions emerge: the sexual pursuer/aggressor, performed by the majority of his online personas, and the friend/boyfriend, performed by a single persona. Analysis of the offender’s self-describing assertives suggests this distinctive persona shares most attributes with the offender’s ‘home identity’. This article importantly raises the question of whether move analysis might be useful in identifying the ‘offline persona’ in cases where offenders are known to operate multiple online personas in the pursuit of child victims.

Original languageEnglish
Pages (from-to)675–698
Number of pages24
JournalApplied Linguistics
Volume40
Issue number4
Early online date28 Mar 2018
DOIs
Publication statusPublished - 1 Aug 2019

Bibliographical note

© Oxford University Press 2018
This is an Open Access article distributed under the terms of the Creative Commons Attribution License
(http://creativecommons.org/licenses/by/4.0/), which permits unrestricted reuse, distribution, and reproduction
in any medium, provided the original work is properly cited.

Fingerprint

Dive into the research topics of 'Deceptive identity performance: Offender moves and multiple identities in online child abuse conversations'. Together they form a unique fingerprint.

Cite this