2017
DOI: 10.1108/ics-03-2017-0009
|View full text |Cite
|
Sign up to set email alerts
|

Spear phishing in organisations explained

Abstract: Purpose The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient. Design/methodology/approach Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails. Findings Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

1
22
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 41 publications
(23 citation statements)
references
References 57 publications
1
22
0
Order By: Relevance
“…A phishing email, for example, is unlikely to be effective if the message violates norms of the target's culture. We also consider the more specific case of organizational culture in the workplace because it is highly relevant to employee behavior as it applies to cyber security (Bullee et al, 2017 ). As with all of the other short-and long-term variables that we consider, culture is assumed to interact with the other variables, with particularly large interactions with age, gender, and perhaps personality.…”
Section: Overview Of Human Cognitionmentioning
confidence: 99%
See 2 more Smart Citations
“…A phishing email, for example, is unlikely to be effective if the message violates norms of the target's culture. We also consider the more specific case of organizational culture in the workplace because it is highly relevant to employee behavior as it applies to cyber security (Bullee et al, 2017 ). As with all of the other short-and long-term variables that we consider, culture is assumed to interact with the other variables, with particularly large interactions with age, gender, and perhaps personality.…”
Section: Overview Of Human Cognitionmentioning
confidence: 99%
“…Rocha Flores et al ( 2014 ) finds that there is no significant correlation between phishing resiliency and gender. Bullee et al ( 2017 ) finds that gender does not contribute to phishing message responses. Abbasi et al ( 2016 ) finds (i) women with a high self-efficacy have a low susceptibility to social engineering cyberattacks, and that women without awareness of the social engineering cyberattack threat have a high susceptibility to these attacks; and (ii) men with previous costly experiences with phishing attacks have a low susceptibility to these attacks, while overconfidence increases the susceptibility to these attacks.…”
Section: Victim Cognition Through the Lens Of Social Engineering Cmentioning
confidence: 99%
See 1 more Smart Citation
“…The taxonomy comprised three main entities that have been argued to form every social engineering attack, the operator of the attack, the type of the attack, and the attack channel. The attack can be originated by either a person which reflected a limited number of victims such as spear phishing [6] or by a malicious software which usually targeted a considerable huge number of users such as the cross-site scripting attack in SN [7].…”
Section: Literature Reviewmentioning
confidence: 99%
“…Previous studies have only focused on users of similar or certain demographics: permanently residing in developed countries, certain age, certain socio-economic status etc., Refs. [11], [18], [19], [20]. Joinson et al posit that, in order to properly protect cybersecurity, it is important to integrate culture, behaviour and the design of security tools and policies [21].…”
Section: Introductionmentioning
confidence: 99%