{"title":"韩礼德主述位在b谷歌隐私政策文本中的运用:法律语言学研究","authors":"Sabtra Lesmana, Sawirman Sawirman, Fajri Usman","doi":"10.31940/soshum.v12i2.161-170","DOIUrl":null,"url":null,"abstract":"This research was aimed to reveal and explain the violations conducted by Google to its user privacy which is implied through its Privacy Policy Agreement statement by analyzing it with Theme and Rheme proposed by Halliday. This qualitative research was done by applying the documentation recording method in collecting data and the Halliday’s Systemic Functional Linguistics as the basic theory. The result of the data was presented in the table analysis and in the form of descriptive interpretation. The result showed that Google build its clauses with the 4 types of theme construction. From the analyzed clauses, the dominantly built clause is the single constituent with marked theme where “We” is the mostly occurred subject. Yet, Google applied unmarked theme mosty in their clauses. With this dominant occurences of “We”, Google construe its existence as the authority holders of the w hole agreement. The researchers found that similar finite predicator appeared repeatedly such “collect” and “use” in building its clauses. These constitute Google’s strategy in order to force the user’s permission to let Google freely access their privacy. In addition, the operation of the conjunction “and”, extention, expansion and exemplificatory constituents represent the plentiful request of Google related to its user’s information. Those summarized the violation conducted by Google to its user’s privacy.","PeriodicalId":56206,"journal":{"name":"Soshum Jurnal Sosial dan Humaniora","volume":" ","pages":""},"PeriodicalIF":0.0000,"publicationDate":"2022-08-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"The use of Halliday’s Theme-Rheme on Google’s Privacy Policy Text: A Forensic Linguistics Research\",\"authors\":\"Sabtra Lesmana, Sawirman Sawirman, Fajri Usman\",\"doi\":\"10.31940/soshum.v12i2.161-170\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This research was aimed to reveal and explain the violations conducted by Google to its user privacy which is implied through its Privacy Policy Agreement statement by analyzing it with Theme and Rheme proposed by Halliday. This qualitative research was done by applying the documentation recording method in collecting data and the Halliday’s Systemic Functional Linguistics as the basic theory. The result of the data was presented in the table analysis and in the form of descriptive interpretation. The result showed that Google build its clauses with the 4 types of theme construction. From the analyzed clauses, the dominantly built clause is the single constituent with marked theme where “We” is the mostly occurred subject. Yet, Google applied unmarked theme mosty in their clauses. With this dominant occurences of “We”, Google construe its existence as the authority holders of the w hole agreement. The researchers found that similar finite predicator appeared repeatedly such “collect” and “use” in building its clauses. These constitute Google’s strategy in order to force the user’s permission to let Google freely access their privacy. In addition, the operation of the conjunction “and”, extention, expansion and exemplificatory constituents represent the plentiful request of Google related to its user’s information. Those summarized the violation conducted by Google to its user’s privacy.\",\"PeriodicalId\":56206,\"journal\":{\"name\":\"Soshum Jurnal Sosial dan Humaniora\",\"volume\":\" \",\"pages\":\"\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2022-08-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Soshum Jurnal Sosial dan Humaniora\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.31940/soshum.v12i2.161-170\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Soshum Jurnal Sosial dan Humaniora","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31940/soshum.v12i2.161-170","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
The use of Halliday’s Theme-Rheme on Google’s Privacy Policy Text: A Forensic Linguistics Research
This research was aimed to reveal and explain the violations conducted by Google to its user privacy which is implied through its Privacy Policy Agreement statement by analyzing it with Theme and Rheme proposed by Halliday. This qualitative research was done by applying the documentation recording method in collecting data and the Halliday’s Systemic Functional Linguistics as the basic theory. The result of the data was presented in the table analysis and in the form of descriptive interpretation. The result showed that Google build its clauses with the 4 types of theme construction. From the analyzed clauses, the dominantly built clause is the single constituent with marked theme where “We” is the mostly occurred subject. Yet, Google applied unmarked theme mosty in their clauses. With this dominant occurences of “We”, Google construe its existence as the authority holders of the w hole agreement. The researchers found that similar finite predicator appeared repeatedly such “collect” and “use” in building its clauses. These constitute Google’s strategy in order to force the user’s permission to let Google freely access their privacy. In addition, the operation of the conjunction “and”, extention, expansion and exemplificatory constituents represent the plentiful request of Google related to its user’s information. Those summarized the violation conducted by Google to its user’s privacy.