{"id":"https://openalex.org/W2762332720","doi":"https://doi.org/10.1108/ics-03-2017-0009","title":"Spear phishing in organisations explained","display_name":"Spear phishing in organisations explained","publication_year":2017,"publication_date":"2017-10-03","ids":{"openalex":"https://openalex.org/W2762332720","doi":"https://doi.org/10.1108/ics-03-2017-0009","mag":"2762332720"},"language":"en","primary_location":{"id":"doi:10.1108/ics-03-2017-0009","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2017-0009","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://ris.utwente.nl/ws/files/29121725/Bullee2017spear.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035625057","display_name":"Jan-Willem Bull\u00e9e","orcid":"https://orcid.org/0000-0003-0067-6863"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":true,"raw_author_name":"Jan-Willem Bullee","raw_affiliation_strings":["Faculteit Elektrotechniek Wiskunde en Informatica, Universiteit Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculteit Elektrotechniek Wiskunde en Informatica, Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5042976194","display_name":"Lorena Montoya","orcid":"https://orcid.org/0000-0001-6403-9834"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Lorena Montoya","raw_affiliation_strings":["Faculteit Elektrotechniek Wiskunde en Informatica, Universiteit Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculteit Elektrotechniek Wiskunde en Informatica, Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5086905649","display_name":"Marianne Junger","orcid":"https://orcid.org/0000-0002-9515-9860"},"institutions":[{"id":"https://openalex.org/I94624287","display_name":"University of Twente","ror":"https://ror.org/006hf6230","country_code":"NL","type":"education","lineage":["https://openalex.org/I94624287"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Marianne Junger","raw_affiliation_strings":["Faculteit Gedrags- Management- en Maatschappijwetenschappen, Universiteit Twente, Enschede, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculteit Gedrags- Management- en Maatschappijwetenschappen, Universiteit Twente, Enschede, The Netherlands","institution_ids":["https://openalex.org/I94624287"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5016345474","display_name":"Pieter Hartel","orcid":"https://orcid.org/0000-0002-0411-0421"},"institutions":[{"id":"https://openalex.org/I98358874","display_name":"Delft University of Technology","ror":"https://ror.org/02e2c7k09","country_code":"NL","type":"education","lineage":["https://openalex.org/I98358874"]}],"countries":["NL"],"is_corresponding":false,"raw_author_name":"Pieter Hartel","raw_affiliation_strings":["Faculty of Electrical Engineering, Mathematics and Computer Science,Delft University of Technology, Delft, The Netherlands"],"affiliations":[{"raw_affiliation_string":"Faculty of Electrical Engineering, Mathematics and Computer Science,Delft University of Technology, Delft, The Netherlands","institution_ids":["https://openalex.org/I98358874"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5035625057"],"corresponding_institution_ids":["https://openalex.org/I94624287"],"apc_list":null,"apc_paid":null,"fwci":7.0717,"has_fulltext":true,"cited_by_count":54,"citation_normalized_percentile":{"value":0.97152384,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"25","issue":"5","first_page":"593","last_page":"613"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9961000084877014,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9591000080108643,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.9585126638412476},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.5121200084686279},{"id":"https://openalex.org/keywords/originality","display_name":"Originality","score":0.4463752210140228},{"id":"https://openalex.org/keywords/electronic-mail","display_name":"Electronic mail","score":0.4347800016403198},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.36293482780456543},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.30283087491989136},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.3002358078956604},{"id":"https://openalex.org/keywords/psychology","display_name":"Psychology","score":0.277706503868103},{"id":"https://openalex.org/keywords/social-psychology","display_name":"Social psychology","score":0.155645489692688}],"concepts":[{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.9585126638412476},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.5121200084686279},{"id":"https://openalex.org/C2776950860","wikidata":"https://www.wikidata.org/wiki/Q2914681","display_name":"Originality","level":3,"score":0.4463752210140228},{"id":"https://openalex.org/C3020028006","wikidata":"https://www.wikidata.org/wiki/Q9158","display_name":"Electronic mail","level":2,"score":0.4347800016403198},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.36293482780456543},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.30283087491989136},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.3002358078956604},{"id":"https://openalex.org/C15744967","wikidata":"https://www.wikidata.org/wiki/Q9418","display_name":"Psychology","level":0,"score":0.277706503868103},{"id":"https://openalex.org/C77805123","wikidata":"https://www.wikidata.org/wiki/Q161272","display_name":"Social psychology","level":1,"score":0.155645489692688},{"id":"https://openalex.org/C11012388","wikidata":"https://www.wikidata.org/wiki/Q170658","display_name":"Creativity","level":2,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1108/ics-03-2017-0009","is_oa":false,"landing_page_url":"https://doi.org/10.1108/ics-03-2017-0009","pdf_url":null,"source":{"id":"https://openalex.org/S4210195545","display_name":"Information and Computer Security","issn_l":"2056-4961","issn":["2056-4961","2056-497X"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319811","host_organization_name":"Emerald Publishing Limited","host_organization_lineage":["https://openalex.org/P4310319811"],"host_organization_lineage_names":["Emerald Publishing Limited"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Information &amp; Computer Security","raw_type":"journal-article"},{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/17578680-3b49-4913-b34d-853727d73f80","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/17578680-3b49-4913-b34d-853727d73f80","pdf_url":"https://ris.utwente.nl/ws/files/29121725/Bullee2017spear.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bullee, J-W, Montoya, L, Junger, M & Hartel, P 2017, 'Spear phishing in organisations explained', Information and Computer Security, vol. 25, no. 5, pp. 593-613. https://doi.org/10.1108/ICS-03-2017-0009","raw_type":"info:eu-repo/semantics/publishedVersion"},{"id":"pmh:oai:ris.utwente.nl:publications/17578680-3b49-4913-b34d-853727d73f80","is_oa":false,"landing_page_url":null,"pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":""}],"best_oa_location":{"id":"pmh:oai:ris.utwente.nl:openaire_cris_publications/17578680-3b49-4913-b34d-853727d73f80","is_oa":true,"landing_page_url":"https://research.utwente.nl/en/publications/17578680-3b49-4913-b34d-853727d73f80","pdf_url":"https://ris.utwente.nl/ws/files/29121725/Bullee2017spear.pdf","source":{"id":"https://openalex.org/S4406922991","display_name":"University of Twente Research Information","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"other-oa","license_id":"https://openalex.org/licenses/other-oa","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Bullee, J-W, Montoya, L, Junger, M & Hartel, P 2017, 'Spear phishing in organisations explained', Information and Computer Security, vol. 25, no. 5, pp. 593-613. https://doi.org/10.1108/ICS-03-2017-0009","raw_type":"info:eu-repo/semantics/publishedVersion"},"sustainable_development_goals":[{"score":0.7799999713897705,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G275330988","display_name":"Technology-supported Risk Estimation by Predictive Assessment of Socio-technical Security","funder_award_id":"318003","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G3829048491","display_name":null,"funder_award_id":"FP7/2007-2013","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5593277320","display_name":null,"funder_award_id":"2007-2013","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"},{"id":"https://openalex.org/G5702163051","display_name":null,"funder_award_id":"FP7/2007","funder_id":"https://openalex.org/F4320320300","funder_display_name":"European Commission"}],"funders":[{"id":"https://openalex.org/F4320320300","display_name":"European Commission","ror":"https://ror.org/00k4n6c32"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2762332720.pdf","grobid_xml":"https://content.openalex.org/works/W2762332720.grobid-xml"},"referenced_works_count":67,"referenced_works":["https://openalex.org/W55403762","https://openalex.org/W105140810","https://openalex.org/W158727920","https://openalex.org/W603221366","https://openalex.org/W1526745844","https://openalex.org/W1556246284","https://openalex.org/W1559424115","https://openalex.org/W1654840018","https://openalex.org/W1672705232","https://openalex.org/W1693279105","https://openalex.org/W1880091624","https://openalex.org/W1966997002","https://openalex.org/W1980800679","https://openalex.org/W1986494037","https://openalex.org/W1989801194","https://openalex.org/W1993537989","https://openalex.org/W2000645163","https://openalex.org/W2004608871","https://openalex.org/W2007189859","https://openalex.org/W2010287226","https://openalex.org/W2013880803","https://openalex.org/W2013970953","https://openalex.org/W2020276559","https://openalex.org/W2022334732","https://openalex.org/W2024488177","https://openalex.org/W2027328206","https://openalex.org/W2027505338","https://openalex.org/W2029591949","https://openalex.org/W2032522955","https://openalex.org/W2037668591","https://openalex.org/W2047574247","https://openalex.org/W2048965767","https://openalex.org/W2056119313","https://openalex.org/W2060288170","https://openalex.org/W2065666502","https://openalex.org/W2066872410","https://openalex.org/W2066978993","https://openalex.org/W2066989237","https://openalex.org/W2069522384","https://openalex.org/W2081228936","https://openalex.org/W2081526168","https://openalex.org/W2082348123","https://openalex.org/W2084044852","https://openalex.org/W2095300193","https://openalex.org/W2098093078","https://openalex.org/W2113712374","https://openalex.org/W2114204486","https://openalex.org/W2114419549","https://openalex.org/W2122201185","https://openalex.org/W2129661061","https://openalex.org/W2137296414","https://openalex.org/W2138094294","https://openalex.org/W2139204976","https://openalex.org/W2151274689","https://openalex.org/W2153518124","https://openalex.org/W2162532690","https://openalex.org/W2183548010","https://openalex.org/W2323046584","https://openalex.org/W2335888457","https://openalex.org/W2346227778","https://openalex.org/W2482850453","https://openalex.org/W2493598256","https://openalex.org/W2499590469","https://openalex.org/W2521132308","https://openalex.org/W3193532866","https://openalex.org/W4255850669","https://openalex.org/W4285719527"],"related_works":["https://openalex.org/W2593155302","https://openalex.org/W2041415459","https://openalex.org/W2072812638","https://openalex.org/W3126095231","https://openalex.org/W2352855287","https://openalex.org/W2378906650","https://openalex.org/W2384288445","https://openalex.org/W4200527052","https://openalex.org/W2034179494","https://openalex.org/W4221100201"],"abstract_inverted_index":{"Purpose":[0],"The":[1,148,171],"purpose":[2],"of":[3,13,27,55,62,109,120,142],"this":[4],"study":[5],"is":[6,125,136,146],"to":[7,32,38,74,94,99,162,166,175],"explore":[8],"how":[9],"the":[10,18,22,56,63,79,113,117,123,139],"opening":[11,49,140],"phrase":[12],"a":[14,69,85,102,143],"phishing":[15,28,47,71,81,144,154,178],"email":[16,48,145],"influences":[17],"action":[19],"taken":[20,126],"by":[21,153],"recipient.":[23],"Design/methodology/approach":[24],"Two":[25],"types":[26],"emails":[29,155],"were":[30,36,91],"sent":[31],"593":[33],"employees,":[34],"who":[35],"asked":[37],"provide":[39,95],"personally":[40],"identifiable":[41],"information":[42],"(PII).":[43],"A":[44],"personalised":[45],"spear":[46,80,177],"was":[50,106],"randomly":[51],"used":[52],"in":[53,68,78],"half":[54],"emails.":[57],"Findings":[58],"Nineteen":[59],"per":[60,76],"cent":[61,77],"employees":[64],"provided":[65],"their":[66,96,168],"PII":[67,114],"general":[70],"email,":[72],"compared":[73,98],"29":[75],"condition.":[82],"Employees":[83],"having":[84],"high":[86],"power":[87],"distance":[88],"cultural":[89],"background":[90],"more":[92],"likely":[93],"PII,":[97],"those":[100],"with":[101],"low":[103],"one.":[104],"There":[105],"no":[107],"effect":[108],"age":[110],"on":[111],"providing":[112],"requested":[115],"when":[116,138],"recipient\u2019s":[118],"years":[119],"service":[121],"within":[122],"organisation":[124],"into":[127],"account.":[128],"Practical":[129],"implications":[130],"This":[131],"research":[132],"shows":[133],"that":[134],"success":[135],"higher":[137],"sentence":[141],"personalised.":[147],"resulting":[149],"model":[150],"explains":[151],"victimisation":[152],"well,":[156],"and":[157],"it":[158],"would":[159],"allow":[160],"practitioners":[161],"focus":[163],"awareness":[164],"campaigns":[165],"maximise":[167],"effect.":[169],"Originality/value":[170],"innovative":[172],"aspect":[173],"relates":[174],"explaining":[176],"using":[179],"four":[180],"socio-demographic":[181],"variables.":[182]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":6},{"year":2024,"cited_by_count":7},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":10},{"year":2021,"cited_by_count":6},{"year":2020,"cited_by_count":8},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-21T08:13:44.787528","created_date":"2025-10-10T00:00:00"}
