Skip to main content

Categorization of Threatening Speech Acts

  • Conference paper
  • First Online:
Speech and Computer (SPECOM 2022)

Abstract

The paper explores the notion of threatening speech act which is defined as an intentional speech action aimed at suppressing the will of other people and deterioration of their mental state. Based on semantic and pragmatic features of threatening speech acts described in the literature we build a dataset out of randomly collected messages containing verbalized threats presented open access on different Internet social networks sites, Internet forums and Internet messengers. A total number of 68 messages dated from 2015 to 2021 in Russian language are manually processed using contextual analysis and methods of Forensic Linguistics. Categorization method based on (1) type of addressor’s intention, (2) direction of threatening speech act, and (3) type of threatening speech act gave a matrix proving our research hypothesis, that among the analyzed messages the most frequent type of threatening speech acts are threats-punishments towards addressees aiming at harming their lives or health. At the same time the prevalent communicative intention of the addressor in such threatening speech acts is the realization of psycho-emotional affect in the form of a threat and the desire to demonstrate the “power” in communication.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 89.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 119.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Contextual analysis is based on the idea that the statement gets meaning in a situational and social context and is the function of this context [1, p. 46–49].

  2. 2.

    When analyzing a disputed text through Forensic Linguistic procedure an expert uses general scientific methods such as analysis and synthesis, and specific linguistic methods such as semantic-syntactic, lexical-semantic, functional-stylistic, grammatical, functional-pragmatic types of analysis, analysis of the communicative structure of text organization, analysis of presuppositions, analysis of propositions, component analysis, content analysis, contextual analysis [13].

  3. 3.

    Translation from Russian into English is made by the authors of this paper. We tried to convey the author style of writing in punctuation marks, but failed to convey all the syntax and lexical peculiarities presented in original messages in Russian language.

  4. 4.

    According to Article 137 “Animals” of the Civil Code of the Russian Federation, «the general rules about the property are applied to animals since other laws or other legal acts are not established» [8].

References

  1. Arnold, I.V.: Osnovy nauchnykh issledovanyj v lingvistike. Vysshaya shkola, Moscow (1991).(in Russian)

    Google Scholar 

  2. Baranov, A.N.: Semantika ugrozy v lingvisticheskoj ekspertize (Semantics of threat in Forensic Linguistics). In: Computernaya lingvistika i intellektualnye tekhnologii. Po materialam ezhegodnoj Mezhdunarodnoj konferentsii “Dialog” (Computational Linguistics and Intellectual Technologies. International conference “Dialogue”), vol. 12(19), issue 1, pp. 72–82. Moscow (2013). https://www.dialog-21.ru/media/1223/baranovan.pdf (in Russian)

  3. Baranov, A.N.: Ugroza v kriminal’nom diskurse (semantika i pragmatika) (Threat in criminal discourse (semantics and pragmatics)). Azbukovnik, Moscow (2021).(in Russian)

    Google Scholar 

  4. Brinev, K.I.: Sudebnaja lingvisticheskaja jekspertiza po delam, svjazannym s ugrozoj (Forensic linguistic expertise on threatening cases). Theor. Pract. Aspects Speech Act. 4, 43–49 (2009). (in Russian)

    Google Scholar 

  5. Brinev, K.I.: Teoreticheskaja lingvistika i sudebnaja lingvisticheskaja jekspertiza (Theoretical linguistics and forensic linguistic expertise). AltGPA, Barnaul. http://os.x-pdf.ru/20kulturologiya/519346-1-ki-brinev-teoreticheskaya-lingvistika-sudebnaya-lingvisticheskaya-eks.php (2009). (in Russian)

  6. Dayshutov, M.M., Dineka, V.I., Denisenko, M.V.: Mental abuse in criminal law. Vestnik Moscovskogo Universiteta MVD Rossii 3, 77–81 (2019). https://elibrary.ru/item.asp?id=38581612 (in Russian)

  7. Digital civility index – 2021 report (2021). https://www.microsoft.com/en-us/online-safety/digital-civility#coreui-banner-q42zgbu

  8. Grazhdanskij kodeks Rossijskoj Federacii (Civil Code of the Russian Federation) (2022). http://www.consultant.ru/document/cons_doc_LAW_5142/fd6980fe6d3f891c65ca00040c9d100eeb2ef3ee/. (in Russian)

  9. Komalova, L., Glazkova, A., Morozov, D., Epifanov, R., Motovskikh, L., Mayorova, E.: Automated classification of potentially insulting speech acts on social network sites. In: Alexandrov, D.A., et al. (eds.) DTGS 2021. CCIS, vol. 1503, pp. 365–374. Springer, Cham (2022). https://doi.org/10.1007/978-3-030-93715-7_26

    Chapter  Google Scholar 

  10. Komalova, L., Goloshchapova, T.: Differentiated analysis of the “insult” speech genre based on messages from a social network Internet sites. RUDN J. Lang. Stud. Semiot. Seman. 12(3), 619–631 (2021). https://doi.org/10.22363/2313-2299-2021-12-3-619-631. (in Russian)

    Article  Google Scholar 

  11. Komalova, L., Kulagina, D.: Perceiving speech aggression with and without textual context on twitter social network site. In: Karpov, A., Potapova, R. (eds.) SPECOM 2021. LNCS (LNAI), vol. 12997, pp. 348–359. Springer, Cham (2021). https://doi.org/10.1007/978-3-030-87802-3_32

    Chapter  Google Scholar 

  12. Komalova, L., Sadova, E.: Pragmatic vector of verbalized aggression within internet mediated communication: textual context dimension. Vestn. Volgogr. Gos. Univ.. Ser. 2 Jazykozn. 3, 77–89 (2022). https://doi.org/10.15688/jvolsu2.2022.3.7. (in Russian)

    Article  Google Scholar 

  13. Kukushkina, O.V.: Methods used in Forensic Linguistic analysis. Theory Pract. Forensic Sci. 1, 118–126 (2016). https://doi.org/10.30764/64/1819-2785-2016-1-118-126. (in Russian)

    Article  Google Scholar 

  14. Ljubešić, N., Fišer, D., Erjavec, T.: The FRENK datasets of socially unacceptable discourse in Slovene and English. In: Ekštein, K. (ed.) TSD 2019. LNCS (LNAI), vol. 11697, pp. 103–114. Springer, Cham (2019). https://doi.org/10.1007/978-3-030-27947-9_9

    Chapter  Google Scholar 

  15. Nick, I.M.: In the wake of hate: a mixed-method analysis of anonymous threatening communications sent during the 2016 US presidential election. Nord. J. Linguist. 41(2), 183–203 (2018). https://doi.org/10.1017/S0332586518000148

    Article  Google Scholar 

  16. Novozhenova, Z.L., Probst, N.A.: On the speech-act nature of the verbal threat. Vestnik IKBFU. Philology, Pedagogy, and Psychol. 4, 31–36 (2019). https://elibrary.ru/item.asp?id=41424254 (in Russian)

  17. Plotnikova, A.M.: Linguistic creativity in threat speech and its mechanisms. Ural Philological Herald. Series Language. System. Pers.: The Linguistics Creativity 2, 81–88 (2017). https://elibrary.ru/item.asp?id=29246424 (in Russian)

  18. Probst, N., Shkapenko, T., Tkachenko, A., Chernyakov, A.: Speech act of threat in everyday conflict discourse: production and perception. Lege Artis 3(2), 204–250 (2018). https://doi.org/10.2478/lart-2018-0019

    Article  Google Scholar 

  19. Shelinger, T.N.: Netradicionno vydeljaemye kommunikativnye edinicy sovremennogo anglijskogo jazyka (Non-traditionally allocated communicative units of modern English). PhD Dissertation. A.A. Zhdanov Leningrad State University, Leningrad (1986) (in Russian)

    Google Scholar 

  20. Simrat, K., Sarbjeet, S., Sakshi, K.: Abusive content detection in online user-generated data: a survey. Procedia Comput. Sci. 189, 274–281 (2021). https://doi.org/10.1016/j.procs.2021.05.098

    Article  Google Scholar 

  21. Sourander, A., et al.: Psychosocial risk factors associated with cyberbullying among adolescents: a population-based study. Arch. Gen. Psychiatry 67(7), 720–728 (2010)

    Article  Google Scholar 

  22. Walton, D.: Speech acts and indirect threats in ad baculum arguments: a reply to Budzynska and Witek. Argumentation 28(3), 317–324 (2014). https://scholar.uwindsor.ca/crrarpub/14

  23. Watt, D., Kelly, S., Llamas, C.: Inference of threat from neutrally-worded utterances in familiar and unfamiliar language. York Pap. Linguist. Ser. 2(13), 99–120 (2013)

    Google Scholar 

  24. Wierzbicka, A.: Speech genders. Speech Genders 1, 99–111 (1997). https://www.elibrary.ru/item.asp?id=36422407 (in Russian)

  25. Zlokazov, K.V., Kolmykova, T.I., Rybyakova, E.A., Stepanov, R.I.: Perception of threat in infosphere by the reader: experimental research results. Political Linguistics 2, 131–138 (2017). https://elibrary.ru/item.asp?id=29115157 (in Russian)

Download references

Acknowledgements

The research is carried out within the framework of the state assignment to the Federal State Budgetary Educational Institution «Moscow State Linguistic University», project No FSFU-2020-0020 «Perspective technologies of Government’s informational function realization and maintenance of digital sovereignty».

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Liliya Komalova .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Komalova, L., Kalyuzhnaya, L. (2022). Categorization of Threatening Speech Acts. In: Prasanna, S.R.M., Karpov, A., Samudravijaya, K., Agrawal, S.S. (eds) Speech and Computer. SPECOM 2022. Lecture Notes in Computer Science(), vol 13721. Springer, Cham. https://doi.org/10.1007/978-3-031-20980-2_32

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-20980-2_32

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-20979-6

  • Online ISBN: 978-3-031-20980-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics