• No results found

How to Spot a Scammer: Pragma-Rhetorical and Linguistic Differences Between '419 scam' Emails and Institutional Emails

N/A
N/A
Protected

Academic year: 2021

Share "How to Spot a Scammer: Pragma-Rhetorical and Linguistic Differences Between '419 scam' Emails and Institutional Emails"

Copied!
130
0
0

Bezig met laden.... (Bekijk nu de volledige tekst)

Hele tekst

(1)

How  to  Spot  a  Scammer:  

Pragma-­‐Rhetorical  and  Linguistic  Differences  Between  

‘419  scam’  Emails  and  Institutional  Emails  

 Universiteit  van  Amsterdam  

Faculteit  der  Geesteswetenschappen    Linguistics  of  European  Languages:  English   Soraya  Zeeman                

 

begeleider:  dr.  S.C.  Vedder   tweede  lezer:  dr.  E.A.  Bannink   Juni  2016  

(2)

Contents  

1. Introduction 3  

2. Theoretical  framework 5  

2.1:  Speech  Acts  and  Politeness  Theory 5  

2.1.1:  Speech  Acts   5  

  2.1.2:  Politeness  Theory     6  

2.2:  Grice’s  Conversational  Maxims   7  

2.2.1:  Cooperative  Principle   7  

2.2.2:  Maxim  of  Quantity     7  

2.2.3:  Maxim  of  Relevance     8  

2.2.4:  Maxim  of  Manner     9  

2.2.5:  Maxim  of  Quality     10  

2.2.6:  Violation  (implicatures)   10  

2.3:  Modifiers     11  

2.3.1:  Internal  Modifiers:  Syntactic     12  

2.3.2:  Internal  Modifiers:  Lexical/Phrasal   14  

2.3.3:  External  Modifiers     15  

3. Characteristics  of  Institutional  Email  &  ‘419  Scam’  Email 18  

3.1:  History  of  Email  and  Structure  of  Institutional  Emails 18  

3.1.1:  Brief  History  of  Email   18  

  3.1.2:  Structure  of  Institutional  Emails     19  

3.2:  Brief  History  of  ‘419  Scam’  Email  &  Structure  of  ‘419  Scam’  Email   20  

3.2.1:  History  of  Spam     20  

3.2.2  ‘419  Scam’     21  

3.3:  Openings  &  Closings   24  

3.3.1:  Function  of  Openings  and  Closings     25  

3.3.2:  Usage  of  Openings  and  Closings  in  Email   26  

4. Methodology 30  

4.1:  Objective  &  Research  Question 30  

4.2:  Corpora   31  

4.3:  Analysis   33  

5. Results 34  

5.1:  Treatment  of  Grice’s  Maxims  in  Both  Corpora 34  

5.2:  Use  of  Conventional  Openings  and  Closings   38  

5.2.1:  Conventional  and  Non-­‐Conventional  Openings   38  

  5.2.2:  Conventional  and  Non-­‐Conventional  Closings   41  

5.3:  Use  of  Modifiers  in  Both  Corpora     44  

5.3.1:  Syntactic  Modifiers     45  

5.3.2:  Lexical/Phrasal  Modifiers   47  

5.3.3:  External  Modifiers     48  

6. Discussion 52  

6.1:  Treatment  of  Grice’s  Maxims 52  

6.2:  The  Use  of  Openings  and  Closings   53  

6.3:  The  Use  of  Modifiers     54  

6.4:  Answering  the  Research  Question   55  

(3)

1.  Introduction  

 

  Imagine  it  is  the  evening  of  January  1st;  you  have  just  started  enjoying  the  new  year  when  an  

email  message  reaches  your  inbox.  The  sender  is  Sister  Kadijat  Jubril  and  the  subjects  reads  ‘Happy   new   year’.   You   do   not   know   a   Sister   Kadijat   Jubril   but   you   decide   to   open   the   email   anyway.   The   sender  of  the  email  introduces  herself  as  the  64  year  old  widow  of  Ibrahim  Jubril,  a  wealthy  man  who   was   killed   during   the   Ogoni   Crisis.   After   her   husband’s   death,   Kadijat   inherited   $28.3   million.   However,  Kadijat  is  very  ill  and  is  looking  for  someone  who  can  use  the  money  to  do  good  things  with   after  she  dies.  If  you  are  interested,  you  only  need  to  give  her  your  full  name,  address,  and  telephone   number.  While  receiving  $28.3  million  sounds  great,  you  are  not  too  certain  about  the  intentions  of   this   Nigerian   widow;   something   seems   to   be   not   quite   right   but   you   cannot   tell   exactly   what   it   is.   What  are  the  components  of  the  email  that  make  us  feel  like  this  is  not  just  another  request  email   like   the   ones   we   get   every   day?   Scam   emails   like   the   one   described   here,   also   called   ‘419   scam’   emails,   are   often   recognised   as   being   insincere   in   intent,   but   it   can   be   difficult   to   tell   what,   apart   from   the   outrageous   request,   gives   it   away.   This   study   aims   to,   from   a   pragma-­‐rhetorical   and   linguistic   perspective,   give   a   clearer   view   on   exactly   why   these   emails   seem   insincere.       This   study   will   compare   two   email   corpora,   a   scam   email   corpus   and   an   institutional   request   email  corpus,  on  three  different  pragma-­‐rhetorical  and  linguistic  aspects.  This  study  will  first  look  at   the  treatment  of  Grice’s  conversational  maxims  (Grice  1975).  According  to  Grice,  interlocutors  should   want   to   respect   these   maxims   if   their   aim   is   to   have   a   polite   conversation.   The   maxims   state   that   interlocutors   should   be   truthful,   that   they   should   give   the   right   amount   of   information,   that   they   should  speak  in  an  unambiguous  manner,  and  that  they  should  stick  to  the  topic  of  conversation.  The   failure   to   respect   these   guidelines   is   called   a   violation   and   can   create   a   new   context.   While   interlocutors   violate   or   flout   these   maxims   for   several   reasons,   it   is   interesting   to   see   how   these   maxims  are  treated  in  different  types  of  request  email.  Therefore  this  study  will  look  at  how  often   the  emails  in  both  corpora  violate  these  maxims.  This  study  will  also  look  at  previous  research  done   on   openings   and   closings   in   (email)   conversations   (Crystal   2006;   Waldvogel   2007)   to   analyse   the   openings  and  closings  of  scam  emails  and  institutional  request  emails.  The  aim  is  to  see  if  the  way  in   which  scam  emails  open  and  close  is  different  from  the  way  institutional  request  emails  open  and   close.  

  This  study  will  also  analyse  the  use  of  modifiers.  A  considerable  amount  of  research  has  been   done  on  the  use  of  internal  and  external  modifiers  in  requests  (Alcón  Soler  2013;  Barron  2003;  Blum-­‐ Kulka   1989;   Economidou-­‐Kogetsidis   2008;   Hassall   2001).   The   usage   of   modifiers   is   related   to   the   notion  of  imposition  (Brown  &  Levinson  1987).  Requests  can  have  a  low  degree  of  imposition,  like   asking  to  borrow  a  pen,  or  a  high  degree  of  imposition,  like  borrowing  a  lot  of  money.  Generally,  an  

(4)

increase  of  imposition  implies  an  increase  of  modifiers/politeness.  This  study  will  compare  the  use  of   modifiers  in  both  scam  emails  and  institutional  request  emails.  Since  maxims,  openings  and  closings,   and   modifiers   all   influence   the   politeness   of   communication   in   their   own   way,   they   will   be   called   politeness-­‐related  notions  in  this  study.    

  In  order  to  find  the  pragma-­‐rhetorical  differences  between  ‘419  scam’  emails  and  institutional   request   emails   this   study   will   use   two   small   corpora;   one   consisting   of   scam   emails   and   one   consisting   of   request   emails   sent   within   organisations   (between   university   staff   and   student,   employer  and  employee,  and  employee  and  customer).  The  scam  email  corpus  is  made  up  of  60  ‘419   scam’   emails,   almost   all   of   them   from   Africa.   These   scam   emails   all   contain   one   or   more   requests   regarding  the  transfer  of  money.  The  institutional  request  email  corpus  is  made  up  of  25  emails.  The   requests  in  this  corpus  are  mainly  concerned  with  asking  for  help  in  completing  a  task.  In  order  to   make   a   good   comparison   the   emails   from   both   corpora   are   all   similar   in   the   relationship   between   sender  and  recipient  and  type  of  speech  act,  namely  the  request.  The  results  should  point  out  the   pragma-­‐rhetorical   and   linguistic   differences   between   both   corpora.   Before   this   study   moves   on   to   the  results  section,  chapter  two,  the  theoretical  framework,  will  discuss  some  of  the  aforementioned   politeness-­‐related   notions   (Grice’s   Maxims   [Grice   1975],   openings   &   closings,   and   modifiers).   The   third  chapter  will  elaborate  on  the  characteristics  of  institutional  emails  and  ‘419  scam’  emails  and   the  use  of  opening  and  closings  in  email.  Chapter  four  will  discuss  the  corpora  and  the  methodology   of   the   study.   Chapter   five   and   six   will   discuss   the   results   and   how   they   relate   to   the   theories   discussed  in  chapter  two  and  three.  Suggestions  for  further  research  will  also  be  given.  The  findings   should   shed   a   light   on   whether   there   are   indeed   pragma-­‐rhetorical   differences   between   request   emails   sent   by   people   such   as   Sister   Kadijat   Jubril   and   request   emails   we   receive   from   employers,   teachers,  and  members  of  staff.  Before  we  come  to  this  point,  however,  it  is  necessary  to  discuss  the   theoretical  framework  that  was  used  for  the  analysis.    

(5)

2.  Theoretical  Framework  

 

  This   study   will   focus   on   two   corpora   of   request   emails   from   a   pragma-­‐rhetoric   angle.   The   analysis  will  look  at  the  treatment  of  Grice’s  (1975)  maxims,  the  use  of  openings  and  closings,  and   the  use  of  modifiers.  But  what  do  these  three  notions  have  to  do  with  request  emails?  How  are  they   linked  to  requests  and  what  effect  do  they  have  on  politeness?  The  following  chapter  aims  to  answer   these  questions  by  first  explaining  the  nature  of  requests  and  the  impact  they  have  on  interlocutors.   It   will   then   discuss   how   the   three   previously   mentioned   notions   can   be   used   in   combination   with   requests  and  what  sort  of  effect  they  have  on  the  request  and  the  hearer.    

 

2.1  Speech  acts  &  Politeness  Theory  

 

When  communicating,  interlocutors  often  have  a  certain  goal  or  expectation.  For  example,  this   can   be   to   congratulate   or   compliment   the   hearer.   These   goals   can   usually   be   accomplished   by   uttering   a   congratulatory   statement   or   a   compliment.   The   goal   of   the   speaker   would   be   more   difficult  to  achieve  if  they  were  to  make  a  request.  Whereas  the  congratulation  and  the  compliment   do   not   impose   on   the   freedom   of   the   hearer,   the   request   does.   In   order   to   appear   polite   and   decrease   the   degree   of   imposition   on   the   hearer,   the   speaker   can   use   several   pragma-­‐rhetorical   devices.  In  order  to  understand  the  theoretical  underpinnings  of  this  study,  it  is  necessary  to  discuss   what  exactly  requests  are,  how  they  affect  the  degree  of  politeness  experienced  by  the  hearer,  and   what  can  be  done  to  make  requests  less  of  an  imposition  on  the  hearer.    

 

2.1.1  Speech  Acts  

  Apart   from   physical   acts   such   as   jumping,   cooking,   and   running,   we   also   accomplish   goals   through  what  are  called  ‘speech  acts’.  This  type  of  act  is  verbal  and  uses  language  to  accomplish  its   goals.   Every   day   we   perform   many   different   types   of   speech   acts.   The   American   philosopher   John   Searle   distinguished   five   different   types   of   speech   acts   (1975).   The   first   type   of   speech   act   is   the   representative.  The  representative  often  present  a  state  of  affairs  (e.g.  statements  and  descriptions).   Examples  are  ‘The  ball  is  red’  and  ‘I  am  happy’.  Representatives  can  often  be  said  to  be  either  true  or   false  (Finegan  2008:  284).  The  second  type  of  speech  act  in  Searle’s  classification  is  the  expressive.   Expressives   are   said   to   show   the   speaker’s   attitude   or   psychological   state.   Think   for   example   of   greetings  (‘It’s  nice  to  see  you’)  or  condolences  (‘I  am  sorry  for  your  loss’).  Searle’s  (1975)  third  type   of  speech  act  is  the  commissive.  Commissives  commit  the  speaker  to  a  future  course  of  action.  This   includes  promises  (‘I  will  do  it  tomorrow’)  and  threats  (‘I  will  kill  her’).  The  fourth  type  of  speech  act   is   the   declarative.   According   to   Finegan   (2008)   they   “bring   about   the   state   of   affairs   they   name”  

(6)

(284).  This  means  that  by  uttering  a  declarative  the  speaker  declares  a  new  fact.  Think  for  example  of   marrying  (‘I  now  declare  you  man  and  wife’)  and  firing  (‘You  are  fired’).  The  last  type  of  speech  act   classified   by   Searle   (1975)   is   the   directive.   They   instruct   the   hearer   to   do   something.   Think   of   commands  (‘Do  the  dishes’),  advice  (‘You  should  buy  that  dress’),  dares  (‘I  dare  you  to  kiss  him’),  and   the  most  important  speech  act  for  this  study:  the  request.  Unlike  the  other  speech  acts,  directives   have  a  high  chance  of  being  perceived  as  impolite  because  they  threaten  something  called  the  ‘face’   of  the  hearer  and  the  speaker  (Goffman  1967).    

   

2.1.2  Politeness  Theory  

  In  1987,  Brown  and  Levinson  formulated  an  idea  called  ‘politeness  theory’.  This  theory,  mainly   concerned  with  politeness  in  social  encounters,  relied  heavily  on  the  concept  of  ‘face’.  This  concept   was  first  described  by  Erving  Goffman  (1967)  as:  “the  positive  social  value  a  person  effectively  claims   for  himself  by  the  line  others  assume  he  has  taken  during  a  particular  contact”  (Goffman  1967:  5).   Briefly  said,  face  refers  to  an  individual’s  public  self-­‐image.  According  to  Brown  and  Levinson  (1987),   face  consists  of  two  aspects  called  the  negative  and  the  positive  face.  Positive  face  is  concerned  with   getting  approval  from  others  while  negative  face  is  concerned  with  freedom  of  action  and  not  being   imposed   on   by   others.   Brown   and   Levinson   claim   that   face   is   something   that   “can   be   lost,   maintained,   or   enhanced,   and   must   be   constantly   attended   to   in   interaction”   (Brown   &   Levinson   1987:  61).  In  most  social  encounters,  “it  is  in  the  participants’  best  interest  to  maintain  each  other’s   faces”  (Brown  &  Levinson  1987:  61),  meaning  that  both  participants  will  try  to  be  as  polite  as  needed.   However,   while   there   might   be   a   wish   to   maintain   both   the   speaker’s   and   the   hearer’s   face,   sometimes  interlocutors  cannot  help  but  threaten  their  own  face  and  that  of  the  other  while  uttering   certain  speech  acts.  Brown  and  Levinson  (1987)  call  these  occurrences  face-­‐threatening  acts  (FTA’s)   (65).  Some  examples  of  speech  acts  that  can  threaten  positive  face  are  disapproval,  disagreement,   complaints,   since   they   impend   on   one’s   desire   for   approval.   Negative   face   can   be   threatened   by   warnings,  threats,  and  requests  since  they  impend  on  the  desire  for  freedom  of  action.  There  are,   however,  several  ways  to  make  a  request  less  face  threatening.  The  following  sections  will  explain   what   kind   of   strategies   can   be   employed   to   mitigate   the   force   of   a   request   and   to   increase   the   chances  of  the  hearer  wanting  to  fulfil  the  request.    

(7)

2.2  Grice’s  Conversational  Maxims  

 

One  of  the  politeness-­‐related  notions  that  speakers  can  employ  to  make  a  request  more  polite  is   the  cooperative  principle  as  formulated  in  1975  by  the  British  philosopher  Paul  Grice  (1913  –  1988).   The  following  sections  will  explain  how  Grice’s  cooperative  principle  relates  to  politeness  and  how   the  emails  in  this  study’s  corpora  might  use  the  cooperative  principle  to  increase  the  chances  of  their   request  being  fulfilled.    

 

2.2.1  The  Cooperative  Principle  

  There   are   several   types   of   communication.   It   can   be   done   through   face-­‐to-­‐face   conversations   but   also   through   digital   means   such   as   email,   text,   and   chat.   Regardless   of   the   type   of   communication,   the   interlocutors   are   usually,   apart   from   occasional   misunderstandings,   able   to   understand   utterances   as   how   they   were   intended   by   the   speaker.   How   do   they   do   this?   The   conversation  works  because  the  interlocutors  “trust  that  they  and  their  conversational  partner  are   honouring   the   same   interpretive   conventions”   (Finegan   2008:   287).   The   hearer   assumes   that   the   speaker   has   honoured   the   conventions   of   interpretation   when   making   an   utterance.   The   speaker   must   assume   that   the   hearer   upholds   the   same   conventions,   but   also   that   the   hearer   trusts   the   speaker  to  have  upheld  the  conventions  of  interpretation.  This  means  that  a  successful  conversation   mostly   depends   on   the   hearer   and   speaker   both   cooperating   by   using   the   conventions   of   interpretation.   What   exactly   is   this   “unspoken   pact”   (Finegan   2008:   287)?   In   1975,   Paul   Grice   formulated   an   idea   he   called   the   cooperative   principle.   Grice   wrote:   “[m]ake   your   conversational   contribution  such  as  is  required,  at  the  state  as  which  it  occurs,  by  the  accepted  purpose  or  direction   of  the  talk  exchange  in  which  you  are  engaged”  (1975:  45).  The  cooperative  principle  describes  the   unspoken   pact   that   both   interlocutors   have   to   honour   for   the   conversation   to   be   successful.   Assuming  that  the  senders  of  the  emails  in  this  study’s  corpora  aim  to  come  across  as  polite  as  to   increase   the   chances   of   their   requests   being   accepted,   we   can   expect   them   to   honour   Grice’s   cooperative  principle.  More  specifically,  we  can  expect  them  to  honour  the  four  general  principles   (maxims)  that  the  cooperative  principle  consist  of  according  to  Grice  (1975).  

 

 

2.2.2  Maxim  of  Quantity  

  The  first  maxim  is  concerned  with  the  amount  of  information  a  speaker  is  expected  to  give.  The   Maxim  of  Quantity  states  that  the  speaker  is  expected  give  as  much  information  as  necessary  for  the   hearer  to  understand  the  utterance  but  no  more  than  that;  the  amount  of  information  should  just  be   enough.   Let   us   imagine   a   conversation   between   two   friends.   Friend   A   is   planning   on   going   to   the   beach   and   he   tells   Friend   B   this   and   asks   him   what   the   weather   will   be   like.   If   Friend   B   wants   to  

(8)

honour  the  Maxim  of  Quantity,  and  by  doing  that  the  Cooperative  Principle,  an  appropriate  answer   could  be  ‘25  degrees’.  The  Maxim  of  Quantity  suggests  that  this  is  all  the  information  that  Friend  B   needs  to  give  in  order  to  answer  Friend  A’s  question.  It  implies  that  Friend  B  cannot  think  of  anything   else  that  would  be  relevant  for  Friend  A’s  potential  beach  trip.  However,  ’25  degrees’  could  still  be  a   truthful  answer  even  if  there  would  be  a  storm  that  day.  Technically  speaking  Friend  B  told  the  truth   with   ’25   degrees’   but   according   to   the   Maxim   of   Quantity   Friend   B   is   expected   to   give   more   information  if  there  were  to  be  a  storm  that  day;  in  that  case  a  truthful  ’25  degrees’  would  not  be   enough.   Linking   this   to   the   topic   of   requests,   ‘Can   you   help   me   next   month?’   displays   a   lack   of   information.  What  type  of  help  does  the  speaker  need  and  when  exactly  is  this  help  needed?  If  the   hearer   is   unaware   of   the   context   of   the   request,   the   speaker   has   not   provided   the   hearer   with   sufficient  information.  

  Whereas  the  previous  example  is  an  instance  of  not  enough  information  being  given,  the  Maxim   of  Quantity  can  also  be  violated  through  too  much  information  being  given.  Scam  emails  are  often   guilty   of   giving   too   much   information   to   evoke   sympathy   from   the   recipient.   Requests   are   often   preceded  by  an  elaborate  account  of  the  miserable  history  of  the  scammer  that  has  little  to  do  with   the  actual  request.  People  who  violate  the  Maxim  of  Quantity,  either  by  giving  too  little  information   or  too  much,  are  usually  seen  as  unpleasant  to  talk  with.  They  can  be  regarded  as  being  mysterious   or   shy   when   giving   too   little   information,   or   as   overly   talkative   when   giving   too   much   information   (Finegan  2008:  288).  The  authors  of  the  emails  in  the  corpora  should  thus  want  to  appear  polite  by   giving  the  right  amount  of  information.    

 

2.2.3  Maxim  of  Relevance  

 

Leech  (1983)  describes  the  Maxim  of  Relevance,  sometimes  also  called  the  Maxim  of  Relation,   as:

 

"[a]n  utterance  U  is  relevant  to  a  speech  situation  if  U  can  be  interpreted  as  contributing  to  the   conversational   goal(s)   of   speaker   or   hearer"   (Leech   1983:   94).   Briefly   said,   the   speakers   should   answer  in  a  way  that  is  relevant  to  what  is  being  uttered  at  the  time.  In  the  following  example,  the   Maxim  of  Relevance  is  violated:  

  Person  A:  What  is  your  favourite  animal?  

  Person  B:  Anne  is  obsessed  with  sloths.  I  

It  seems  that  Person  B’s  response  is  completely  irrelevant;  the  speaker  asks  for  Person  B’s  favourite   animal   and   Person   B   responds   with   someone   else’s   favourite   animal.   Usually   when   the   Maxim   of   Relevance  is  violated,  people  look  for  the  reason  why  it  was  violated;  they  look  for  what  the  violation   implies.  A  reason  for  violating  the  Maxim  of  Relevance  is  not  wanting  to  talk  about  a  certain  topic,  or   attempting  to  make  a  joke  (Finegan  2008:  288).  The  implicature  of  a  violation  can  often  be  derived  

(9)

topic  to  avoid  confusion  on  the  part  of  the  hearer.  After  all,  confusing  the  hearer  does  not  bring  the   speaker  any  closer  to  achieving  the  goal  of  the  request.  

 

2.2.4  Maxim  of  Manner  

 

Unlike  the  other  maxims,  the  Maxim  of  Manner  is  not  concerned  with  what  is  said.  Grice  (1975)   describes  the  Maxim  of  Manner  as  not  relating  to  what  is  said  but  rather  to  how  it  is  said  (46).  The   Maxim  of  Manner  consists  of  multiple  rules  that  people  are  expected  to  follow:  avoid  obscurity  of   expression,   avoid   ambiguity,   avoid   unnecessary   prolixity,   and   be   orderly   (Grice   1975:   45-­‐46).   To   better   understand   these   rules   some   examples   of   violations   of   these   rules   will   be   provided   in   the   following  passage.    

  The  first  rule  concerns  obscurity  of  expression;  what  is  said  must  be  clear.  The  following  shows   how  this  rule  can  be  violated:    

  Person  A:  Are  you  coming  to  the  club  tonight?  

  Person  B:  En  Oh  Tee  Aitch  Ay  En  Kay  Es.  

Person   B   could   have   said   ‘no   thanks’   to   avoid   confusion   on   the   part   of   the   hearer.   The   following   example  of  an  ambiguous  statement  is  just  as  confusing:  

  Person  A:  What  did  you  see?  

  Person  B:  I  saw  her  duck.    

This  can  either  mean  that  Person  B  saw  the  duck  that  belonged  to  Person  C  or  that  Person  B  saw   Person  C  squat  down.  The  speaker  could  have  done  more  to  avoid  ambiguity  in  this  sentence.  The   next  example  from  Levinson  (1983)  illustrates  the  use  of  unnecessary  prolixity:  

  Person  A:  You  went  to  the  opera,  didn’t  you?  How  was  the  singer?    

  Person  B:  The  singer  produced  a  series  of  sounds  corresponding  closely  to  the  score  of  an  aria  

  from  'Rigoletto'  (Levinson  1983:  112).    

While  it  might  seem  like  this  is  a  violation  of  the  Maxim  of  Quantity  because  of  the  long  answer,  the   violations  refers  to  the  manner  in  which  the  answer  was  given.  The  content  of  the  answer  does  not   give   more   information   than   is   necessary,   hence   this   is   a   violation   of   the   Maxim   of   Manner   rather   than  a  violation  of  the  Maxim  of  Quantity.  The  last  three  examples  illustrate  that  we  should  expect   the  requests  in  the  corpora  to  be  formulated  in  a  clear  and  unambiguous  manner  to  avoid  confusing   the  recipient  of  the  email.    

  The  last  rule  of  the  Maxim  of  Manner  is  related  to  the  order  of  the  sentence.  Speakers  of  English   usually  prefer  the  events  described  in  a  sentence  to  be  in  chronological  order  (Finegan  2008:  288).   The  following  example  does  not  follow  that  order:  ‘Max  moved  to  New  York  when  he  got  married,  

(10)

his  life.’  The  events  in  this  sentence  are  clearly  not  in  chronological  order.  The  same  can  be  applied  to  

the  way  emails  are  structured.  We  should  expect  the  senders  of  the  emails  in  this  study’s  corpora  to   introduce   themselves   before   making   their   requests.   A   violation   of   this   order   can   be   seen   as   a   violation  of  the  Maxim  of  Manner.    

 

2.2.5  Maxim  of  Quality  

  The  Maxim  of  Quality,  the  fourth  and  last  one,  is  concerned  with  the  truth  of  an  utterance.  It   consists  of  two  parts:  the  speaker  should  not  say  what  they  believe  to  be  false  and  they  should  not   say  something  for  which  they  lack  adequate  evidence.  If  the  cashier  at  the  local  supermarket  claims   that   he   is   the   president   of   the   United   States,   both   rules   are   violated.   It   should   be   noted   that   the   Maxim   of   Quality   could   be   considered   one   of   the   most   important   maxims,   as   the   violation   of   this   maxim   makes   nearly   all   other   maxims   irrelevant.   If   something   is   a   lie,   it   does   not   matter   if   the   chronological  order  is  correct,  it  is  still  a  lie.  The  same  goes  for  too  much  or  too  little  information;  the   amount  does  not  matter  if  the  content  is  a  lie.  This  means  that  scammers,  who  are  known  to  make   up  a  false  backstory  (see  section  3.3.2),  consistently  violate  the  Maxim  of  Quality.    

 

2.2.6  Violation  (implicatures)  

  As  seen  in  the  examples  that  were  given  in  previous  sections,  language-­‐users  often  violate  the   principles  set  by  Grice.  Someone  may  lie  on  purpose  or  be  unintelligible  because  they  are  nervous  or   not   fluent   in   the   language   they   are   attempting   to   speak.   In   his   article,   Grice   (1975)   came   up   with   three  different  ways  in  which  someone  can  fail  to  observe  these  maxims:  a  speaker  can  opt  out  of  a   maxim,  they  can  flout  a  maxim,  or  they  can  violate  a  maxim.  When  speakers  opt  out  of  a  maxim  they   show  that  they  are  unwilling  to  do  what  the  maxim  would  require  of  them  (such  as  being  truthful  or   giving  enough  information).  Consider  the  following  example:  Person  A  has  bought  a  book  but  has  not   read  it  yet.  Person  B  asks  Person  A  whether  they  enjoyed  the  book.  The  Maxim  of  Quantity  suggests   Person  A  should  be  as  informative  as  is  required,  but  the  Maxim  of  Quality  suggests  that  one  should   not   say   something   for   which   they   lack   evidence.   Person   A   must   choose   between   giving   the   information  needed  and  not  saying  something  for  which  they  lack  evidence.  By  stating  that  they  have   not  read  the  book  yet  Person  A  opts  out  of  the  Maxim  of  Quantity  but  they  observe  the  Maxim  of   Quality  (Martinich  1984:  36).    

  Another  manner  in  which  a  speaker  can  non-­‐observe  a  maxim  is  by  flouting  it.  When  a  maxim  is   flouted,  the  speaker  deliberately  does  not  observe  it.  Thomas  (1995)  claims  a  maxim  is  flouted  when   “[a]  speaker  blatantly  fails  to  observe  a  maxim,  not  with  any  intention  of  deceiving  or  misleading,  but   because  the  speaker  wishes  to  prompt  the  hearer  to  look  for  a  meaning  which  is  different  from,  or  in  

(11)

addition  to,  the  expressed  meaning”  (Thomas  1995:  65).  Briefly  said,  speakers  flout  a  maxim  because   they  want  the  hearer  to  understand  what  they  are  implicating  by  doing  so.  The  following  examples   show  why  maxims  are  often  flouted.  Person  A  had  an  exciting  date  this  weekend  and  Person  B,  who   wants  to  know  all  about  the  date,  asks  Person  A  how  the  date  was.  If  Person  A  were  to  respond  with   ‘it  was  okay’  then  the  Maxim  of  Quantity  is  obviously  not  observed;  Person  B  expects  much  more   information.  In  this  case,  it  seems  like  Person  A  is  flouting  the  Maxim  of  Quantity  because  they  do   not  want  to  discuss  the  topic.  The  implication  of  this  short  answer  is  that  Person  B  should  move  on  to   a  different  topic.  Consider  the  same  situation  again.  Person  B  asks  Person  A  about  the  date.  If  Person   A   responded   with   ‘lovely   weather,   isn’t   it?’   they   are   flouting   the   Maxim   of   Relevance.   Again,   the   implication  is  that  Person  A  does  not  want  to  talk  about  this  particular  topic.    

  Violation  of  a  maxim  can  be  seen  as  the  “unostentatious  or  ‘quiet’  non-­‐observance  of  a  maxim”   (Dinu   2012:   18).   According   to   Grice   (1975),   a   speaker   who   violates   the   maxims   “will   be   liable   to   mislead”   (Grice   1975:   49).   Unlike   the   flouting   of   a   maxim,   the   violation   of   a   maxim   does   not   encourage  the  hearer  to  look  for  hidden  or  implied  meanings;  in  fact,  hearers  are  encouraged  to  take   the  utterance  at  face  value.  This  is  also  the  case  in  scam  emails.  The  authors  fabricate  a  story  not  to   urge   the   recipient   to   look   for   further   meaning,   which   is   what   happens   when   a   maxim   is   flouted,   rather  they  urge  the  recipient  to  believe  what  they  have  been  told.  The  details  of  a  scam  email  are   carefully  planned  by  the  scammer  and  aim  to  deceive  the  recipient.    

  Summarizing,   if   interlocutors   want   their   utterances   to   achieve   the   desired   goal,   they   need   to   cooperate.  This  is  explained  in  the  cooperative  principle  which  states  that  both  hearer  and  speaker   need   to   follow   a   set   of   guidelines   called   maxims.   Since   the   authors   of   the   emails   in   this   study’s   corpora   aim   to   have   their   request   fulfilled   by   the   recipient,   it   is   necessary   to   downtone   the   illocutionary   force   of   the   request.   Subsequently,   this   means   that   we   can   expect   emails   to   never   violate  Grice’s  maxims.  

 

2.3

 

Modifiers  

 

  As   discussed   in   the   previous   part   of   this   chapter,   speech   acts,   especially   requests,   can   have   a   high   degree   of   imposition.   The   term   imposition   is   linked   to   Brown   and   Levinson’s   (1987)   face-­‐ threatening  acts  (see  section  2.1.2).  It  was  already  discussed  that  requests  threaten  the  face  of  the   hearer  by  imposing  on  their  freedom  of  action.  The  more  a  request  imposes  on  the  freedom  of  the   hearer,  the  higher  the  degree  of  imposition  is.  For  example,  asking  to  borrow  a  pencil  is  a  request   with  low  imposition.  Asking  to  borrow  500  euros  is  a  request  with  high  imposition.  In  order  to  avoid   damage  to  the  hearer’s  face,  the  speaker  will  need  to  mitigate  the  force  of  the  request.  One  way  of   doing  this  is  by  using  modifiers.  This  section  aims  to  give  an  explanation  of  what  modifiers  are,  what  

(12)

types   of   modifiers   there   are,   and   how   they   are   used.   In   short,   modifiers   and   hedges   are   used   to   modify   the   degree   of   imposition   on   the   hearer;   when   used   in   the   formulation   of   a   request   they   should  reduce  the  degree  of  imposition.  How  much  the  degree  of  imposition  is  reduced  depends  on   the   modifiers   that   are   used.   After   all,   a   direct   order   is   less   polite   than   an   indirect   request   that   contains   modifiers.   Since   interlocutors   generally   aim   to   be   polite,   and   politeness   can   be   achieved   through  the  use  of  modifiers  in  requests,  we  should  expect  to  find  a  large  amount  of  modifiers.  The   fact   that   the   senders   and   recipients   in   both   corpora   do   not   know   each   other   only   lends   to   the   expectation  that  many  modifiers  will  be  used  to  mitigate  the  force  of  the  request.  As  Codina-­‐Espurz   (2008)  states,  “strangers  […]  tend  to  use  more  modifiers”  (Codina-­‐Espurz  2008:  252).  The  relationship   between  sender  and  recipient  is  not  the  only  aspect  that  has  an  influence  on  the  amount  of  modifiers   used.   Félix-­‐Brasdefer   (2012)   claims   that   the   amount   of   modifiers   “[is]   conditioned   by   the   level   of   imposition  of  the  request”  (Félix-­‐Brasdefer  2012:  114).  This  means  that  scam  emails,  with  their  high   degree  of  imposition,  are  expected  to  use  more  modifiers  than  institutional  request  emails.    

  We  can  also  expect  to  find  several  types  of  modifiers.  A  request  can  be  modified  through  lexical,   phrasal  and  syntactic  choices  as  well  as  through  elements  that  precede  or  follow  the  actual  request   (Achiba   2003:   132-­‐133).   These   two   different   types   are   called   internal   modification   and   external   modification   respectively.   Both   of   these   groups   consist   of   types   of   modifiers:   ‘downgraders’   and   ‘upgraders’.  The  first  will  tone  down  the  impact  a  speech  act  has  on  the  hearer,  while  the  latter  will   most   likely   increase   the   impact   (Trosborg   1995:   214).   Since   this   study   is   concerned   with   the   mitigation   of   requests,   only   downgraders   will   be   discussed.   In   order   for   the   reader   to   understand   which   modifiers   and   hedges   will   be   looked   at   in   the   analysis,   it   is   necessary   to   briefly   discuss   the   downgraders  that  internal  modification  and  external  modification  consist  of.    

 

2.3.1  Internal  Modifiers:  Syntactic

 

  The  first  kind  of  internal  modifier  that  will  be  discussed  is  the  syntactic  modifier.  The  syntactic   modifier   is   made   up   of   several   types.   Most   of   these   types,   as   argued   by   Trosborg   (1995),   aim   to   “distance   the   request   from   reality”   (Trosborg   1995:   209).   The   politeness   of   the   request   increases   because  the  expectations  regarding  the  request  are  toned  down.  Mitigation  works  in  two  ways  in  this   case;  because  of  the  requester’s  low  expectations  a  possible  rejection  will  not  cause  much  face  loss.   On   the   other   hand,   mitigation   makes   it   easier   for   the   hearer   to   reject   the   request.   One   (rather   obvious)  way  of  making  a  request  more  polite  is  by  asking,  instead  of  ordering.    

  (1)  Can  you  give  me  a  ride?     (2)  Give  me  a  ride.  

(13)

Since   we   can   assume   that   the   senders   of   the   emails   in   both   corpora   aim   to   be   polite,   we   should   expect   to   find   questions   rather   than   orders.   Questioning   can   be   combined   with   several   other   modifiers  to  reduce  the  degree  of  imposition  even  more.  One  of  these  modifiers  is  aspect.  Aspect  can   consist  of  the  use  of  past  tense  or  durative  aspect.  Using  aspect  as  a  downgrader  creates  a  certain   kind   of   distance.   A   request   can   also   be   mitigated   by   the   speaker   expressing   their   appreciation   or   desire  for  a  certain  situation.  This  type  of  modifier  is  called  the  subjunctive.  Another  downgrader  that   can  be  combined  with  a  question  is  negation.  By  stating  that  they  are  uncertain  of  the  outcome  of   the   request   the   speaker   downtones   the   expectations,   creating   the   same   two-­‐fold   effect   that   was   discussed  before;  the  hearer  does  not  feel  obliged  and  the  speaker  does  not  lose  face.  The  negation   introduces  another  downtoner  that  can  be  combined  with  a  question,  namely  the  tag  question.  Tag   questions   “appeal   to   the   hearer’s   consent”   (Trosborg   1995:   210)   and   therefore   tone   down   the   degree  of  imposition.  The  speaker  could  also  employ  the  conditional,  the  conditional  clause,  and  the   conditional   formula   to   distance   themselves   from   the   reality   of   the   FTA.   Not   all   syntactic   modifiers   occur  in  combination  with  a  question.  The  speaker  might  also  use  an  embedded  appreciative  clause   to  mitigate  the  force  of  a  request.  This  process  is  called  appreciative  embedding.  These  embedded   clauses,  as  the  name  suggests,  often  show  appreciation.  The  following  table  gives  an  overview  of  the   syntactic  modifiers  that  were  previously  discussed:  

 

Table  1:  Overview  of  types  of  syntactic  modifiers  

 

     

Syntactic  modifiers   Examples  

Past  tense   Might  I  ask  for  your  help?  

Negation   You  couldn’t  help  me,  could  you?  

Tag  question   You  couldn’t  help  me,  could  you?  

Aspect   I’m  wondering  if  you  can  help.  

Appreciative  embedding   I  would  appreciate  it  if  you  could  help.  

Subjunctive   I  suggest  you  help  me.  

Conditional   Would  you  help  me?  

Conditional  clause   What  would  you  say  if  I  asked  you  to  help  me?  

(14)

2.3.2  Internal  Modifiers:  Lexical/Phrasal

 

  The  politeness  marker  is  perhaps  the  lexical/phrasal  modifier  that  is  used  most  often.  Examples   of  politeness  markers  are  ‘please’  and  ‘kindly’.  When  a  speaker  chooses  to  use  a  politeness  marker   like  ‘please’  or  ‘kindly’  it  “signal[s]  politeness  and  [it  can]  elicit  cooperative  behaviour  from  his  or  her   addressee”  (Achiba  2003:  133).  Since  eliciting  cooperative  behaviour  is  the  aim  of  a  request  we  can   expect  the  requests  in  our  corpora  to  contain  many  politeness  markers.    

  The  second  lexical/phrasal  modifier,  the  subjectiviser,  shows  that  not  all  modifiers  are  related  to   questions.  Imposition  can  also  be  reduced  by  adding  an  additional  clause  or  phrase.  By  adding  this   clause  or  phrase  the  speaker  creates  a  distance  between  the  request  and  reality  (Trosborg  1995:  210-­‐ 211).   It   also   reduces   “the   assertive   force   of   the   request”   (Achiba   2003:   136).   When   using   subjectivisers,  the  speaker  starts  the  request  with  a  phrase  that  conveys  their  attitude  towards  the   request.  Because  there  are  numerous  ways  in  which  someone  can  express  their  feelings,  there  are   also   several   types   of   subjectivisers   such   as   subjective   subjectivisers   and   tentative   subjectivisers.   Because  the  subjective  phrase  expresses  the  personal  belief  of  the  speaker,  the  degree  of  imposition   is  reduced.  For  example,  the  phrase  ‘I’m  afraid’  expresses  the  fact  that  the  speaker  feels  sorry  for  the   hearer  which  creates  a  more  personal  bond.  Another  type  of  lexical/phrasal  modifier  is  the  appealer.   When  using  an  appealer,  the  speaker  adds  a  tag  at  the  end  of  the  sentence.  When  adding  this  tag,   the   speaker   asks   for   the   hearer’s   understanding   and   consent   which   downtones   the   degree   of   imposition.   However,   the   appealer   is   not   the   only   type   of   modifier   that   asks   for   the   hearer’s   understanding;   the   speaker   could   also   use   a   consultative   device.   The   consultative   device   does   not   only   ask   the   hearer   for   their   understanding,   it   also   actively   involves   them   by   asking   for   their   cooperation.   Something   similar   happens   when   the   speaker   uses   another   modifier   called   a   downtoner.  This  modifier  mitigates  the  force  of  the  request  through  lexical  items  that  suggest  the   possible  non-­‐compliance  of  the  hearer.    

  While   appealers,   consultative   devices   and   downtoners   ask   for   the   involvement   and   understanding  of  the  hearer,  there  are  also  several  lexical/phrasal  modifiers  that  try  to  downtone  the   imposition   in   another   way.   For   example,   the   understater   tries   to   minimise   part   of   the   request   by   under-­‐representing   the   situation   (Blum-­‐Kulka   1989:   204).   Something   similar   happens   when   using   hedges.  When  employing  hedges  the  speaker  intentionally  creates  a  grey  area  regarding  the  content   of  the  request,  how  it  should  be  performed,  when  it  should  be  performed,  or  any  other  aspect.  The   following   table   gives   an   overview   of   the   different   types   of   lexical/phrasal   modifiers:    

     

(15)

 

 Table  2:  Overview  of  lexical/phrasal  modifiers    

 

2.3.3  External  Modifiers  

 

As  mentioned  before,  internal  modifiers  are  not  the  only  kind  of  modifiers.  The  second  group  is   called   external   modifiers.   Whereas   internal   modifiers   mitigate   the   imposition   from   within   (internally),   external   modifiers   use   external   supportive   moves   to   achieve   the   same.   Similar   to   the   internal   modifiers,   there   are   many   types   of   external   modifiers.   One   of   these   is   called   a   grounder.   Through  using  a  grounder  the  speaker  can  choose  to  give  a  supportive  reason  to  explain  and  justify   the  request  (‘Could  you  do  the  dishes?  I  already  did  the  cooking’).  Because  of  the  supportive  reason   the  hearer  might  be  more  willing  to  fulfil  the  request.  Another  type  of  modifier  that  give  a  supportive   reason  is  the  specifier.  The  specifier  has  a  purpose  that  is  much  like  that  of  the  downtoner  that  was   discussed  in  the  section  on  internal  modifiers.  It  aims  to  downtone  the  imposition  by  minimising  part   of  the  request  (‘Can  I  borrow  your  notes?  It’s  just  for  chapter  one’).  While  both  the  downtoner  and   the  specifier  minimise  part  of  the  request,  downtoners  are  less  specific  than  specifiers.  This  is  shown   in  table  3.  In  order  to  make  fulfulling  the  request  more  appealing  to  the  hearer  the  speaker  could  use   a  warrant.  Using  a  warrant  reassures  the  reader  that  fulfilling  the  request  will  not  have  any  negative   effects  on  them  (‘Could  you  lend  me  your  car?  I’ll  return  it  in  perfect  condition’).  This  makes  it  easier   for  the  hearer  to  accept  the  request.  The  warrant  consists  of  two  sub-­‐types:  the  positive  warrant  and   the   negative   warrant.   The   positive   warrant,   much   like   appreciative   embedding,   assures   the   hearer   that  their  compliance  will  have  a  positive  result  (‘Can  you  help  me?  I’ll  give  you  $50  if  you  do’).  The  

Lexical/phrasal  modifiers   Examples  

Politeness  marker   Could  you  please  walk  the  dog?  

Subjectiviser   I’m  afraid  you’ll  have  to  work  tomorrow  as  well.  

Appealer   You  can  carry  the  books,  okay?  

Consultative  device   Do  you  think  you  could  help  us  out?  

Downtoner   Perhaps  you  would  like  to  have  a  coffee  with  me?  

Understater   Could  you  give  me  a  little  bit  of  your  food?  

Hedge   Could  you  help  me  with  something?  

Can  you  do  something  to  fix  my  laptop?   Can  you  help  me  with  the  floor  sometime?  

(16)

positive  warrant  is  different  from  appreciative  embedding  because  it  occurs  in  a  separate  sentence   after   the   request   whereas   appreciative   embedding   is   an   added   clause.   This   positive   results   could   either  be  the  gratefulness  of  the  speaker  or  a  reward.  The  negative  warrant  assures  the  hearer  that   not  complying  with  the  request  will  have  a  negative  effect  on  either  the  speaker  or  the  hearer  (‘Can   you  help  me?  I’ll  feel  devastated  if  you  won’t’).      

  Whereas  the  external  modifiers  discussed  in  the  previous  paragraph  are  mainly  lexical/phrasal   elements   that   are   added   after   the   request   the   modifiers   in   this   paragraph   all   occur   before   the   request.   One   type   of   pre-­‐request   modifier   speakers   can   choose   to   use   is   the   preparator.   When   a   speaker   requires   something   with   a   high   degree   of   imposition   from   the   hearer   it   is   necessary   to   carefully   prepare   the   request.   There   are   several   ways   of   doing   that.   The   speaker   can   start   by   preparing   the   content,   preparing   the   speech   act,   checking   the   availability,   or   getting   a   pre-­‐ commitment  (Trosborg  1995).  By  preparing  the  content  the  speaker  makes  sure  that  the  requests  fits   naturally  into  the  context  (‘I’m  looking  forward  to  Carol’s  party.  Speaking  of  which,  can  I  borrow  your   dress?’).  If  the  hearer  is  already  aware  of  the  fact  that  the  speaker  needs  something,  it  might  warn   them  that  the  request  will  be  brought  up.  By  preparing  the  speech  act  the  speaker  lets  the  hearer   know  about  the  request  in  a  more  direct  way  (‘I  need  your  help.  I  can’t  move  the  piano  on  my  own’).   By   checking   whether   the   hearer   is   available   to   fulfil   the   request   the   speaker   makes   sure   that   the   request  will  not  be  rejected  because  of    unavailability  on  the  hearer’s  part  (‘Are  you  free  tomorrow   morning?  I  need  someone  to  babysit  Samuel’).  Asking  about  the  hearer’s  availability  can  also  prevent   the   hearer   from   coming   up   with   a   possible   excuse   as   to   why   they   have   to   reject   the   request   (Trosborg  1995).  By  asking  whether  the  hearer  is  willing  to  help,  the  speaker  secures  commitment   after   which   they   are   free   to   go   ahead   with   the   actual   request   (‘Would   you   help   me   with   something?’).  It  is  possible,  however,  for  the  hearer  to  respond  with  another  question  regarding  the   content   of   the   request,   in   which   case   the   preparatory   question   will   have   been   without   success.     Another  type  of  modifier  that  occurs  before  the  request  is  the  alerter.  The  alerter  is  used  to  get   the   attention   of   the   hearer   and   to   mitigate   the   illocutionary   force   (‘Excuse   me,   could   you   let   me   pass?’).  Pre-­‐request  mitigation  can  also  be  realised  by  using  a  disarmer.  By  using  a  disarmer  before   the  request,  the  speaker  lets  the  hearer  know  that  they  have  sympathy  for  their  situation  (‘I  know   you’re  really  busy,  but  could  you  give  me  a  hand?’).  This  creates  a  friendly  atmosphere  which  might   lead   to   the   hearer   wanting   to   comply   with   the   speaker’s   wishes.   The   use   of   a   disarmer   also   anticipates  possible  objections  that  the  hearer  might  have.  If  the  hearer  rejects  on  grounds  of  what   the  disarmer  already  anticipated,  the  speaker  does  not  lose  face  as  easily.  The  table  below  provides   an  overview  of  the  external  modifiers  discussed  in  this  section:  

(17)

     

Table  3:  Overview  of  external  modifiers  

 

  Section  2.3  has  shown  that  there  are  several  ways  that  a  request  can  be  mitigated.  The  speaker   can  choose  to  use  internal  modifiers.  These  modifiers  modify  the  request  from  within  by  using  either   syntactic   or   lexical/phrasal   choices.   The   speaker   can   also   choose   to   use   external   modifiers.   These   modifiers  downtone  the  imposition  from  outside  by  using  phrases  that  either  precede  or  follow  the   actual  request.  However,  the  use  of  modifiers  is  not  the  only  way  to  downtone  the  imposition  of  the   request.   There   is   another   way   to   appear   polite,   namely   by   starting   and   ending   your   emails   with   openings  and  closings.  Chapter  three  will  discuss  the  characteristics  of  institutional  emails  and  scam   emails  and  the  function  of  using  openings  and  closings  in  email.    

   

External  modifier   Examples  

Grounder   Could  you  do  the  dishes?  I  already  did  the  cooking.  

Specifier   Can  I  borrow  your  notes?  It’s  just  for  chapter  one.  

Warrant   Could  you  lend  me  your  car?  I’ll  return  it  in  perfect   condition.            

Positive  warrant   Can  you  help  me?  I’ll  give  you  $50  if  you  do.  

Negative  warrant   Can  you  help  me?  I’ll  feel  devastated  if  you  won’t.  

Preparator   I’m   looking   forward   to   Carol’s   party.   Speaking   of   which,  can  I  borrow  your  dress?  

 I   need   your   help.   I   can’t   move   the   piano   on   my  

own.  

Are  you  free  tomorrow  morning?  I  need  someone   to  babysit  Samuel.  

Would  you  help  me  with  something?  

Alerter   Excuse  me,  could  you  let  me  pass?  

Disarmer   I  know  you’re  really  busy,  but  could  you  give  me  a   hand?  

Referenties

GERELATEERDE DOCUMENTEN

fundamental methods in the systematic study of religion, and I will explicate what I believe self-identified sociologists, psychologists, anthropologists, and historians of religion

Interestingly, we find that quality of intergenerational ties acts as a suppressor; once accounted for, we find that (1) stepmothers report significantly and even substantially

Before we went to Egypt, some former students gave us some tips related to housing in Egypt and I think those might as well be very useful for future students who want to

This is dedicated to Daniel and Dana, for they are my motivation, my inspiration and my

The current study justifies that narcissistic leaders indeed engage in more abusive behaviour than non-narcissistic leaders; however, once they perceive threats towards

By lesser lights and fleeting shadows Hold on to His ways. With shield

[r]

Thereafter data from an empirical study as used to determine if the governing bodies of secondary schools are aware of their statutory responsibilities, if they