{"id":"https://openalex.org/W4408941302","doi":"https://doi.org/10.1109/access.2025.3555500","title":"Lateral Phishing With Large Language Models: A Large Organization Comparative Study","display_name":"Lateral Phishing With Large Language Models: A Large Organization Comparative Study","publication_year":2025,"publication_date":"2025-01-01","ids":{"openalex":"https://openalex.org/W4408941302","doi":"https://doi.org/10.1109/access.2025.3555500"},"language":"en","primary_location":{"id":"doi:10.1109/access.2025.3555500","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3555500","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1109/access.2025.3555500","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5013922720","display_name":"Mazal Bethany","orcid":"https://orcid.org/0000-0002-3227-9806"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Mazal Bethany","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093751182","display_name":"Athanasios Galiopoulos","orcid":null},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Athanasios Galiopoulos","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5093744098","display_name":"Emet Bethany","orcid":null},"institutions":[{"id":"https://openalex.org/I3121512035","display_name":"Universidad Aut\u00f3noma de Chile","ror":"https://ror.org/010r9dy59","country_code":"CL","type":"education","lineage":["https://openalex.org/I3121512035"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Emet Bethany","raw_affiliation_strings":["Secure AI and Autonomy Laboratory, San Antonio, TX, USA","Secure AI and Autonomy Lab, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Secure AI and Autonomy Laboratory, San Antonio, TX, USA","institution_ids":["https://openalex.org/I3121512035"]},{"raw_affiliation_string":"Secure AI and Autonomy Lab, San Antonio, TX, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054023935","display_name":"Mohammad Bahrami Karkevandi","orcid":null},"institutions":[{"id":"https://openalex.org/I3121512035","display_name":"Universidad Aut\u00f3noma de Chile","ror":"https://ror.org/010r9dy59","country_code":"CL","type":"education","lineage":["https://openalex.org/I3121512035"]}],"countries":["CL"],"is_corresponding":false,"raw_author_name":"Mohammad Bahrami Karkevandi","raw_affiliation_strings":["Secure AI and Autonomy Laboratory, San Antonio, TX, USA","Secure AI and Autonomy Lab, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Secure AI and Autonomy Laboratory, San Antonio, TX, USA","institution_ids":["https://openalex.org/I3121512035"]},{"raw_affiliation_string":"Secure AI and Autonomy Lab, San Antonio, TX, USA","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011800243","display_name":"Nicole Beebe","orcid":"https://orcid.org/0000-0002-0151-1617"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nicole Beebe","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083805756","display_name":"Nishant Vishwamitra","orcid":"https://orcid.org/0000-0002-3728-1921"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Nishant Vishwamitra","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081968453","display_name":"Peyman Najafirad","orcid":"https://orcid.org/0000-0001-9671-577X"},"institutions":[{"id":"https://openalex.org/I45438204","display_name":"The University of Texas at San Antonio","ror":"https://ror.org/01kd65564","country_code":"US","type":"education","lineage":["https://openalex.org/I45438204"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Peyman Najafirad","raw_affiliation_strings":["Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA"],"affiliations":[{"raw_affiliation_string":"Department of Information Systems and Cyber Security, The University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]},{"raw_affiliation_string":"Department of Information Systems and Cyber Security, University of Texas at San Antonio, San Antonio, TX, USA","institution_ids":["https://openalex.org/I45438204"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5013922720"],"corresponding_institution_ids":["https://openalex.org/I45438204"],"apc_list":{"value":1850,"currency":"USD","value_usd":1850},"apc_paid":{"value":1850,"currency":"USD","value_usd":1850},"fwci":26.0064,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.99370478,"is_in_top_1_percent":true,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":96,"max":99},"biblio":{"volume":"13","issue":null,"first_page":"60684","last_page":"60701"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11147","display_name":"Misinformation and Its Impacts","score":0.9915000200271606,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11550","display_name":"Text and Document Classification Technologies","score":0.9843000173568726,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7166800498962402},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5984256267547607},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3960225582122803},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.33419889211654663},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.259141206741333},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.22145473957061768}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7166800498962402},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5984256267547607},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3960225582122803},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.33419889211654663},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.259141206741333},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.22145473957061768}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/access.2025.3555500","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3555500","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:ac209f4ff3c343fa9a3d6cae09eb9cc1","is_oa":true,"landing_page_url":"https://doaj.org/article/ac209f4ff3c343fa9a3d6cae09eb9cc1","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"IEEE Access, Vol 13, Pp 60684-60701 (2025)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1109/access.2025.3555500","is_oa":true,"landing_page_url":"https://doi.org/10.1109/access.2025.3555500","pdf_url":null,"source":{"id":"https://openalex.org/S2485537415","display_name":"IEEE Access","issn_l":"2169-3536","issn":["2169-3536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Access","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G5983984099","display_name":null,"funder_award_id":"70US0920D70090004","funder_id":"https://openalex.org/F4320306110","funder_display_name":"U.S. Department of Homeland Security"}],"funders":[{"id":"https://openalex.org/F4320306110","display_name":"U.S. Department of Homeland Security","ror":"https://ror.org/00jyr0d86"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":52,"referenced_works":["https://openalex.org/W654425362","https://openalex.org/W1983484926","https://openalex.org/W1984770935","https://openalex.org/W2028223155","https://openalex.org/W2059014657","https://openalex.org/W2138157646","https://openalex.org/W2164346415","https://openalex.org/W2248792031","https://openalex.org/W2284487341","https://openalex.org/W2572193563","https://openalex.org/W2765227388","https://openalex.org/W2766428736","https://openalex.org/W2788827950","https://openalex.org/W2902493274","https://openalex.org/W2910687894","https://openalex.org/W2938601794","https://openalex.org/W2978276984","https://openalex.org/W2994155906","https://openalex.org/W3034090456","https://openalex.org/W3085861814","https://openalex.org/W3090717071","https://openalex.org/W3097132857","https://openalex.org/W3133843004","https://openalex.org/W3161804663","https://openalex.org/W4288057710","https://openalex.org/W4313035524","https://openalex.org/W4321191003","https://openalex.org/W4366505372","https://openalex.org/W4379528880","https://openalex.org/W4381104068","https://openalex.org/W4381952831","https://openalex.org/W4385261011","https://openalex.org/W4385412296","https://openalex.org/W4388034851","https://openalex.org/W4388093254","https://openalex.org/W4392563948","https://openalex.org/W4396652324","https://openalex.org/W4399412887","https://openalex.org/W4403360640","https://openalex.org/W4406461453","https://openalex.org/W6679151981","https://openalex.org/W6766395966","https://openalex.org/W6776693929","https://openalex.org/W6781902278","https://openalex.org/W6784004519","https://openalex.org/W6787756966","https://openalex.org/W6848670183","https://openalex.org/W6851985269","https://openalex.org/W6854866820","https://openalex.org/W6860760503","https://openalex.org/W6863529267","https://openalex.org/W6946620886"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W4391093354","https://openalex.org/W2482950156","https://openalex.org/W4396966040","https://openalex.org/W2305322260"],"abstract_inverted_index":{"The":[0,237],"emergence":[1],"of":[2,11,18,57,63,82,125,169,208,220,254],"Large":[3],"Language":[4],"Models":[5],"(LLMs)":[6],"has":[7],"heightened":[8],"the":[9,16,47,61,79,97,154,167,170,194,206,228,240,251],"threat":[10,156,253],"phishing":[12,27,66,87,107,142,162,172,224,256],"emails":[13,28,67,88,143],"by":[14,32,43,71,150,158],"enabling":[15],"generation":[17],"highly":[19],"targeted,":[20],"personalized,":[21],"and":[22,35,84,105,133,178,196,215,222,246],"automated":[23],"attacks.":[24,257],"Traditionally,":[25],"many":[26],"have":[29],"been":[30],"characterized":[31],"typos,":[33],"errors,":[34],"poor":[36],"language.":[37],"These":[38],"errors":[39],"can":[40],"be":[41],"mitigated":[42],"LLMs,":[44],"potentially":[45],"lowering":[46],"barrier":[48],"for":[49,99,230,242],"attackers.":[50],"Despite":[51],"this,":[52],"there":[53],"is":[54],"a":[55,90,115,119,188,217],"lack":[56],"large-scale":[58,92],"studies":[59],"comparing":[60,174],"effectiveness":[62,81],"LLM-generated":[64,140],"lateral":[65,86,141],"to":[68,101,182,205,232,249],"those":[69,148],"crafted":[70],"humans.":[72],"Current":[73],"literature":[74],"does":[75],"not":[76],"adequately":[77],"address":[78,110],"comparative":[80],"LLM":[83,221],"human-generated":[85,223],"in":[89,160,212],"real-world,":[91],"organizational":[93],"setting,":[94],"especially":[95],"considering":[96,227],"potential":[98,229],"LLMs":[100,159,231],"generate":[102,233],"more":[103,234],"convincing":[104,235],"error-free":[106],"content.":[108,236],"To":[109],"this":[111],"gap,":[112],"we":[113,186],"conducted":[114],"pioneering":[116],"study":[117,203],"within":[118],"large":[120],"university,":[121],"targeting":[122],"its":[123],"workforce":[124],"approximately":[126],"9,000":[127],"individuals":[128],"including":[129],"faculty,":[130],"staff,":[131],"administrators,":[132],"student":[134],"workers.":[135],"Our":[136],"results":[137,168],"indicate":[138],"that":[139],"are":[144],"as":[145,147],"effective":[146],"written":[149],"communications":[151],"professionals,":[152],"emphasizing":[153],"critical":[155],"posed":[157],"leading":[161],"campaigns.":[163],"We":[164],"break":[165],"down":[166],"overall":[171],"experiment,":[173],"vulnerability":[175],"between":[176],"departments":[177],"job":[179],"roles.":[180],"Furthermore,":[181],"gather":[183],"qualitative":[184],"data,":[185],"administered":[187],"detailed":[189],"questionnaire,":[190],"revealing":[191],"insights":[192],"into":[193],"reasons":[195],"motivations":[197],"behind":[198],"vulnerable":[199],"employee\u2019s":[200],"actions.":[201],"This":[202],"contributes":[204],"understanding":[207],"cyber":[209],"security":[210],"threats":[211],"educational":[213],"institutions":[214],"provides":[216],"comprehensive":[218],"comparison":[219],"emails\u2019":[225],"effectiveness,":[226],"findings":[238],"highlight":[239],"need":[241],"enhanced":[243],"user":[244],"education":[245],"system":[247],"defenses":[248],"mitigate":[250],"growing":[252],"AI-powered":[255]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":7}],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-10-10T00:00:00"}
