Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Spear Phishing

Handbook of Research on Information and Cyber Security in the Fourth Industrial Revolution
The targeting of particular individuals with tailored emails to get them to respond, click on links, or download attached files—in order to compromise the integrity of the individual, email, technology system, or organization.
Published in Chapter:
Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces
Shalin Hai-Jew (Hutchinson Community College, USA)
DOI: 10.4018/978-1-5225-4763-1.ch002
Abstract
Online human-to-human (and human-to-robot) hyper-personal relationships have evolved over the years, and their prevalence has broadened the available cyberattack surfaces. With the deployment of malicious socialbots on social media in the virtual and AI-informed embodied socialbots in the real, human interests in socializing have become more fraught and risky. Based on the research literature, abductive reasoning from in-world experiences, and analogical analysis to project into the Fourth Industrial Revolution, this work suggests the importance of greater awareness of the risks in interrelating in the virtual and the real and suggests that there are no safe distances.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
The Impact of Human Behavior on Cyber Security
An email spoofing fraud attempt to gain unauthorized access to confidential data.
Full Text Chapter Download: US $37.50 Add to Cart
Online Phishing and Solutions
Phishing for sensitive information by using personalized emails containing malicious attachments or fraudulent web links to target specific members or groups of an organization.
Full Text Chapter Download: US $37.50 Add to Cart
Benefits of Information Security Awareness Training Against Phishing Attacks: A Field Study
It is typically used in targeted attack campaigns to gain access to an individual's account or impersonate a specific individual.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR