Spear Phishing in Organisations Explained

Journal Article (2017)
Author(s)

Jan Willem Bullee (University of Twente)

A.L. Montoya Morales (University of Twente)

M. Junger (University of Twente)

PH Hartel (TU Delft - Cyber Security)

Research Group
Cyber Security
DOI related publication
https://doi.org/10.1108/ICS-03-2017-0009
More Info
expand_more
Publication Year
2017
Language
English
Research Group
Cyber Security
Issue number
5
Volume number
25
Pages (from-to)
593-613

Abstract

Purpose - The purpose of this study is to explore how the opening phrase of a phishing email influences the action taken by the recipient. Design/methodology/approach - Two types of phishing emails were sent to 593 employees, who were asked to provide personally identifiable information (PII). A personalised spear phishing email opening was randomly used in half of the emails. Findings - Nineteen per cent of the employees provided their PII in a general phishing email, compared to 29 per cent in the spear phishing condition. Employees having a high power distance cultural background were more likely to provide their PII, compared to those with a low one. There was no effect of age on providing the PII requested when the recipient's years of service within the organisation is taken into account. Practical implications - This research shows that success is higher when the opening sentence of a phishing email is personalised. The resulting model explains victimisation by phishing emails well, and it would allow practitioners to focus awareness campaigns to maximise their effect. Originality/value - The innovative aspect relates to explaining spear phishing using four sociodemographic variables.

No files available

Metadata only record. There are no files for this record.