{"id":"https://openalex.org/W3016960292","doi":"https://doi.org/10.1365/s40702-020-00613-y","title":"Spear Phishing\u00a02.0: Wie automatisierte Angriffe Organisationen vor neue Herausforderungen stellen","display_name":"Spear Phishing\u00a02.0: Wie automatisierte Angriffe Organisationen vor neue Herausforderungen stellen","publication_year":2020,"publication_date":"2020-04-14","ids":{"openalex":"https://openalex.org/W3016960292","doi":"https://doi.org/10.1365/s40702-020-00613-y","mag":"3016960292"},"language":"de","primary_location":{"id":"doi:10.1365/s40702-020-00613-y","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-020-00613-y","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-020-00613-y.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1365/s40702-020-00613-y.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5061439489","display_name":"Anjuli Franz","orcid":"https://orcid.org/0000-0003-0802-0105"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":true,"raw_author_name":"Anjuli Franz","raw_affiliation_strings":["IT-Seal GmbH, Hilpertstra\u00dfe\u00a031, 64295, Darmstadt, Deutschland","Technische Universit\u00e4t Darmstadt, Hochschulstra\u00dfe\u00a01, 64289, Darmstadt, Deutschland"],"affiliations":[{"raw_affiliation_string":"IT-Seal GmbH, Hilpertstra\u00dfe\u00a031, 64295, Darmstadt, Deutschland","institution_ids":["https://openalex.org/I31512782"]},{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Hochschulstra\u00dfe\u00a01, 64289, Darmstadt, Deutschland","institution_ids":["https://openalex.org/I31512782"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082912598","display_name":"Alexander Benlian","orcid":"https://orcid.org/0000-0002-7294-3097"},"institutions":[{"id":"https://openalex.org/I31512782","display_name":"Technical University of Darmstadt","ror":"https://ror.org/05n911h24","country_code":"DE","type":"education","lineage":["https://openalex.org/I31512782"]}],"countries":["DE"],"is_corresponding":false,"raw_author_name":"Alexander Benlian","raw_affiliation_strings":["Technische Universit\u00e4t Darmstadt, Hochschulstra\u00dfe\u00a01, 64289, Darmstadt, Deutschland"],"affiliations":[{"raw_affiliation_string":"Technische Universit\u00e4t Darmstadt, Hochschulstra\u00dfe\u00a01, 64289, Darmstadt, Deutschland","institution_ids":["https://openalex.org/I31512782"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5061439489"],"corresponding_institution_ids":["https://openalex.org/I31512782"],"apc_list":{"value":2490,"currency":"EUR","value_usd":2990},"apc_paid":{"value":2490,"currency":"EUR","value_usd":2990},"fwci":0.8344,"has_fulltext":true,"cited_by_count":4,"citation_normalized_percentile":{"value":0.80125807,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":91,"max":97},"biblio":{"volume":"57","issue":"3","first_page":"597","last_page":"612"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9994999766349792,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10734","display_name":"Information and Cyber Security","score":0.9980000257492065,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12519","display_name":"Cybercrime and Law Enforcement Studies","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.6342409253120422},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.577675461769104},{"id":"https://openalex.org/keywords/humanities","display_name":"Humanities","score":0.44793617725372314},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.16888371109962463},{"id":"https://openalex.org/keywords/philosophy","display_name":"Philosophy","score":0.12361088395118713},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.05556705594062805}],"concepts":[{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.6342409253120422},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.577675461769104},{"id":"https://openalex.org/C15708023","wikidata":"https://www.wikidata.org/wiki/Q80083","display_name":"Humanities","level":1,"score":0.44793617725372314},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.16888371109962463},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.12361088395118713},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.05556705594062805},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1365/s40702-020-00613-y","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-020-00613-y","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-020-00613-y.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},{"id":"pmh:oai:econstor.eu:10419/289162","is_oa":true,"landing_page_url":"https://hdl.handle.net/10419/289162","pdf_url":null,"source":{"id":"https://openalex.org/S4306401696","display_name":"Econstor (Econstor)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"doc-type:article"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:120208","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/120208/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Artikel"}],"best_oa_location":{"id":"doi:10.1365/s40702-020-00613-y","is_oa":true,"landing_page_url":"https://doi.org/10.1365/s40702-020-00613-y","pdf_url":"https://link.springer.com/content/pdf/10.1365/s40702-020-00613-y.pdf","source":{"id":"https://openalex.org/S4210205328","display_name":"HMD Praxis der Wirtschaftsinformatik","issn_l":"1436-3011","issn":["1436-3011","2198-2775"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"HMD Praxis der Wirtschaftsinformatik","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.49000000953674316,"display_name":"Reduced inequalities","id":"https://metadata.un.org/sdg/10"},{"score":0.41999998688697815,"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16"}],"awards":[],"funders":[],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3016960292.pdf","grobid_xml":"https://content.openalex.org/works/W3016960292.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W1913835501","https://openalex.org/W2081046118","https://openalex.org/W2085463891","https://openalex.org/W2139204976","https://openalex.org/W2752099845","https://openalex.org/W2883464778","https://openalex.org/W2950948599","https://openalex.org/W2952185213","https://openalex.org/W3005881408","https://openalex.org/W3015330423","https://openalex.org/W4236303630","https://openalex.org/W4238064289"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2149202530","https://openalex.org/W2807822918","https://openalex.org/W2921723332","https://openalex.org/W2482950156","https://openalex.org/W3042334625","https://openalex.org/W3139248031","https://openalex.org/W4200017362","https://openalex.org/W2305322260","https://openalex.org/W2118123121"],"abstract_inverted_index":{"Zusammenfassung":[0],"Vom":[1],"urspr\u00fcnglichen":[2],"\u201ePhishing":[3],"=":[4],"Passwort":[5],"+":[6],"Fishing\u201c":[7],"wandelt":[8],"sich":[9],"das":[10,83],"Angriffsmuster":[11],"durch":[12,58],"neue":[13],"Technologien":[14],"zum":[15],"boomenden":[16],"Gesch\u00e4ftsmodell":[17],"der":[18,69,104,139],"cyberkriminellen":[19],"Szene.":[20],"Schadsoftware":[21],"wie":[22],"\u201eEmotet\u201c":[23],"zeigt,":[24],"dass":[25,130],"automatisierte":[26],"Spear":[27,59,107],"Phishing-Angriffe":[28],"Realit\u00e4t":[29],"geworden":[30],"sind":[31],"und":[32,55,63,109,133],"immense":[33],"Sch\u00e4den":[34],"verursachen.":[35],"Der":[36],"Mitarbeiter":[37,140],"r\u00fcckt":[38],"damit":[39],"in":[40,96],"den":[41],"Fokus":[42],"von":[43,85],"IT-Sicherheitsma\u00dfnahmen.":[44],"Das":[45],"Ziel":[46],"dieses":[47],"Beitrags":[48],"ist":[49],"es,":[50],"einen":[51],"Rundumblick":[52],"zur":[53],"aktuellen":[54],"zuk\u00fcnftigen":[56],"Bedrohungslage":[57],"Phishing":[60,108],"zu":[61,114],"geben":[62],"konkrete":[64],"Handlungsempfehlungen":[65],"abzuleiten.":[66],"Zur":[67],"Messung":[68],"Security":[70,79,123],"Awareness":[71],"im":[72],"organisatorischen":[73,134],"Umfeld":[74],"wird":[75],"die":[76,102,110,128],"Kennzahl":[77],"\u201eEmployee":[78,122],"Index\u201c":[80,124],"vorgestellt,":[81],"welche":[82],"Sicherheitsbewusstsein":[84],"Mitarbeitern":[86],"gegen\u00fcber":[87,106],"Phishing-Angriffen":[88],"standardisiert":[89],"messbar":[90],"macht.":[91],"Es":[92],"wurde":[93],"ein":[94,143],"Feldexperiment":[95],"einer":[97],"deutschen":[98],"Organisation":[99],"durchgef\u00fchrt,":[100],"um":[101],"Verwundbarkeit":[103],"Belegschaft":[105],"Wirksamkeit":[111],"verschiedener":[112],"Trainingsma\u00dfnahmen":[113],"untersuchen.":[115],"Die":[116],"erhobenen":[117],"Daten":[118],"werden":[119],"mithilfe":[120],"des":[121],"bewertet.":[125],"Insgesamt":[126],"verdeutlichen":[127],"Ergebnisse,":[129],"neben":[131],"technischen":[132],"Schutzma\u00dfnahmen":[135],"sowohl":[136],"eine":[137],"Schulung":[138],"als":[141],"auch":[142],"Umdenken":[144],"nutzerverbundener":[145],"Prozesse":[146],"unabdingbar":[147],"ist.":[148]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
