Jason Thatcher




In a paper in the Journal of Information Technology, my team examines how we protect executives from cybercriminals.

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.

The paper is co-authored with Dan Pienta (Baylor University) and Allen Johnston (University of Alabama).

Recommended Citation: Pienta, D., Thatcher, J.B., and Johnston, A. (Forthcoming). “Protecting a Whale in a Sea of Phish.” Journal of Information Technology.


Leave a Reply

Your email address will not be published. Required fields are marked *

Contact Information

email: jason.thatcher@temple.edu

skype: jason.bennett.thatcher

Office Hours

By appointment from Monday through Friday.

I do not consistently respond to messages between 6 PM and 10 PM on weeknights or weekends.

    Skip to toolbar