{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T14:06:50Z","timestamp":1762092410682,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031426810"},{"type":"electronic","value":"9783031426827"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-42682-7_11","type":"book-chapter","created":{"date-parts":[[2023,8,29]],"date-time":"2023-08-29T15:01:46Z","timestamp":1693321306000},"page":"149-163","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["The \u201cHow\u201d Matters: Evaluating Different Video Types for\u00a0Cybersecurity MOOCs"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3121-3888","authenticated-orcid":false,"given":"Daniel","family":"K\u00f6hler","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8218-0732","authenticated-orcid":false,"given":"Wenzel","family":"P\u00fcnter","sequence":"additional","affiliation":[]},{"given":"Christoph","family":"Meinel","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,8,28]]},"reference":[{"key":"11_CR1","volume-title":"Methods of Research in Social Psychology","author":"E Aronson","year":"1990","unstructured":"Aronson, E., Ellsworth, P.C.: Methods of Research in Social Psychology. Social Sciences & World Languages, McGraw-Hill Humanities (1990)"},{"key":"11_CR2","volume-title":"Taxonomy of Educational Objectives: The Classification of Educational Goals","author":"BS Bloom","year":"1956","unstructured":"Bloom, B.S.: Taxonomy of Educational Objectives: The Classification of Educational Goals. Longmans, Green (1956)"},{"key":"11_CR3","unstructured":"Bundeskriminalamt: Bundeslagebild Cybercrime 2021. Bundelagebild Cybercrime, Germany (2022). https:\/\/www.bka.de\/DE\/Presse\/Listenseite_Pressemitteilungen\/2022\/Presse2022\/220509_PM_CybercrimeBLB.html"},{"key":"11_CR4","volume-title":"Experimental and Quasi-Experimental Designs for Research","author":"DT Campbell","year":"2011","unstructured":"Campbell, D.T., Stanley, J.C.: Experimental and Quasi-Experimental Designs for Research. Wadsworth, Belomt, CA (2011)"},{"issue":"3","key":"11_CR5","doi-asserted-by":"publisher","first-page":"579","DOI":"10.1214\/aoms\/1177728726","volume":"25","author":"H Chernoff","year":"1954","unstructured":"Chernoff, H., Lehmann, E.L.: The use of maximum likelihood estimates in $$\\chi ^2$$ tests for goodness of fit. Ann. Math. Stat. 25(3), 579\u2013586 (1954). https:\/\/doi.org\/10.1214\/aoms\/1177728726","journal-title":"Ann. Math. Stat."},{"key":"11_CR6","unstructured":"Cisco: cybersecurity threat trends: phishing, crypto top the list (2021). https:\/\/umbrella.cisco.com\/info\/2021-cyber-security-threat-trends-phishing-crypto-top-the-list"},{"key":"11_CR7","doi-asserted-by":"publisher","unstructured":"Cross, A., et al.: Online learning versus blended learning: an exploratory study. In: Proceedings of the first ACM conference on Learning@Scale. ACM, Atlanta Georgia USA (2014). https:\/\/doi.org\/10.1145\/2556325.2567869","DOI":"10.1145\/2556325.2567869"},{"key":"11_CR8","unstructured":"European union agency for cybersecurity.: ENISA threat landscape 2022: 2021 July to 2022 July. Publications Office, LU (2022). https:\/\/data.europa.eu\/doi\/10.2824\/764318"},{"key":"11_CR9","doi-asserted-by":"crossref","unstructured":"Furnell, S.: Assessing website password practices-unchanged after fifteen years? Comput. Secur. 120, 102790 (2022). iSBN: 0167-4048 Publisher: Elsevier","DOI":"10.1016\/j.cose.2022.102790"},{"key":"11_CR10","doi-asserted-by":"crossref","unstructured":"Goodyear, P., Steeples, C.: Creating shareable representations of practice. ALT-J 6(3), 16\u201323 (1998). iSBN: 0968-7769 Publisher: Taylor & Francis","DOI":"10.1080\/0968776980060303"},{"key":"11_CR11","doi-asserted-by":"publisher","unstructured":"Guo, P.J., Kim, J., Rubin, R.: How video production affects student engagement: an empirical study of MOOC videos. In: Proceedings of the First ACM Conference on Learning @ Scale Conference, pp. 41\u201350. ACM, Atlanta Georgia USA (2014). https:\/\/doi.org\/10.1145\/2556325.2566239","DOI":"10.1145\/2556325.2566239"},{"key":"11_CR12","doi-asserted-by":"publisher","unstructured":"H\u00e4nsch, N., Benenson, Z.: Specifying IT security awareness. In: 2014 25th International Workshop on Database and Expert Systems Applications, pp. 326\u2013330 (2014). https:\/\/doi.org\/10.1109\/DEXA.2014.71. iSSN: 2378-3915","DOI":"10.1109\/DEXA.2014.71"},{"key":"11_CR13","doi-asserted-by":"crossref","unstructured":"Jaeger, L.: Information security awareness: literature review and integrative framework. In: Proceedings of the Annual Hawaii International Conference on System Sciences. IEEE Computer Society, Waikoloa Village, HA USA (2018). http:\/\/hdl.handle.net\/10125\/50482","DOI":"10.24251\/HICSS.2018.593"},{"key":"11_CR14","doi-asserted-by":"publisher","unstructured":"Jaeger, L., Eckhardt, A.: Eyes wide open: the role of situational information security awareness for security-related behaviour. Inf. Syst. J. 31(3), 429\u2013472 (2021). https:\/\/doi.org\/10.1111\/isj.12317. https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1111\/isj.12317","DOI":"10.1111\/isj.12317"},{"issue":"1","key":"11_CR15","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1186\/s13673-020-00237-7","volume":"10","author":"D Jampen","year":"2020","unstructured":"Jampen, D., G\u00fcr, G., Sutter, T., Tellenbach, B.: Don\u2019t click: towards an effective anti-phishing training. HCIS 10(1), 33 (2020). https:\/\/doi.org\/10.1186\/s13673-020-00237-7","journal-title":"HCIS"},{"key":"11_CR16","doi-asserted-by":"publisher","unstructured":"Kizilcec, R.F., Papadopoulos, K., Sritanyaratana, L.: Showing face in video instruction: effects on information retention, visual attention, and affect. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2095\u20132102. ACM, Toronto Ontario Canada (2014). https:\/\/doi.org\/10.1145\/2556288.2557207","DOI":"10.1145\/2556288.2557207"},{"key":"11_CR17","doi-asserted-by":"publisher","unstructured":"K\u00f6hler, D., Meinel, C.: The right tool for the job: overview, comparison and assessment of methods for cybersecurity awareness education and verification. Preprint (2023). https:\/\/doi.org\/10.13140\/RG.2.2.11102.51528","DOI":"10.13140\/RG.2.2.11102.51528"},{"key":"11_CR18","doi-asserted-by":"publisher","unstructured":"K\u00f6hler, D., P\u00fcnter, W., Meinel, C.: Quantitatively exploring phishing susceptibility in private contexts. Preprint, In Review (2023). https:\/\/doi.org\/10.13140\/RG.2.2.21865.47201","DOI":"10.13140\/RG.2.2.21865.47201"},{"key":"11_CR19","doi-asserted-by":"publisher","unstructured":"Lain, D., Kostiainen, K., \u010capkun, S.: Phishing in organizations: findings from a large-scale and long-term study. In: 2022 IEEE Symposium on Security and Privacy (SP), pp. 842\u2013859 (2022). https:\/\/doi.org\/10.1109\/SP46214.2022.9833766. iSSN: 2375-1207","DOI":"10.1109\/SP46214.2022.9833766"},{"key":"11_CR20","unstructured":"Anderson, L.W., et al.: A taxonomy for learning, teaching, and assessing: a revision of bloom\u2019s taxonomy of educational objectives. Longman (2001)"},{"key":"11_CR21","doi-asserted-by":"publisher","unstructured":"Majid, S., Khine, W.K.K., Oo, M.Z.C., Lwin, Z.M.: An analysis of YouTube videos for teaching information literacy skills. In: Thaung, K. (ed.) Advanced Information Technology in Education. Advances in Intelligent and Soft Computing, vol. 126. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-25908-1_20","DOI":"10.1007\/978-3-642-25908-1_20"},{"key":"11_CR22","doi-asserted-by":"publisher","unstructured":"McKight, P.E., Najab, J.: Kruskal-Wallis test. In: The Corsini Encyclopedia of Psychology. Wiley, Ltd. (2010). https:\/\/doi.org\/10.1002\/9780470479216.corpsy0491","DOI":"10.1002\/9780470479216.corpsy0491"},{"key":"11_CR23","volume-title":"Anspruchsniveau von Lernzielen und Pr\u00fcfungen im kognitiven Bereich","author":"C Metzger","year":"1993","unstructured":"Metzger, C., Waibel, R., Henning, C., Hodel, M., Luzi, R.: Anspruchsniveau von Lernzielen und Pr\u00fcfungen im kognitiven Bereich. Universit\u00e4t St, Gallen (1993)"},{"key":"11_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.compedu.2022.104596","volume":"190","author":"RL Moore","year":"2022","unstructured":"Moore, R.L., Blackmon, S.J.: From the learner\u2019s perspective: a systematic review of MOOC learner experiences (2008\u20132021). Comput. Educ. 190, 104596 (2022). https:\/\/doi.org\/10.1016\/j.compedu.2022.104596","journal-title":"Comput. Educ."},{"key":"11_CR25","unstructured":"Pearman, S., Zhang, S.A., Bauer, L., Christin, N., Cranor, L.F.: Why people (don\u2019t) use password managers effectively. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019). USENIX Association, Santa Clara, CA (2019)"},{"key":"11_CR26","doi-asserted-by":"publisher","unstructured":"Pearson, K.: X. On the criterion that a given system of deviations from the probable in the case of a correlated system of variables is such that it can be reasonably supposed to have arisen from random sampling (1900). https:\/\/doi.org\/10.1080\/14786440009463897","DOI":"10.1080\/14786440009463897"},{"key":"11_CR27","unstructured":"Santos-Espino, J.M., Afonso-Su\u00e1rez, M.D., Guerra-Artal, C.: Speakers and boards: a survey of instructional video styles in MOOCs. Tech. Commun. 63(2), 101\u2013115 (2016). iSBN: 0049-3155 Publisher: Society for Technical Communication"},{"key":"11_CR28","doi-asserted-by":"publisher","unstructured":"Steinbeck, H., Zobel, T., Meinel, C.: Using the YouTube Video style in a MOOC: (Re-)testing the effect of visual experience in a field-experiment. In: Proceedings of the Ninth ACM Conference on Learning @ Scale, pp. 142\u2013150. L@S 2022, Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3491140.3528268","DOI":"10.1145\/3491140.3528268"},{"key":"11_CR29","doi-asserted-by":"crossref","unstructured":"Stolberg, H.O., Norman, G., Trop, I.: Randomized controlled trials. Am. J. Roentgenol. 183, 01831539 (2004)","DOI":"10.2214\/ajr.183.6.01831539"},{"key":"11_CR30","doi-asserted-by":"crossref","unstructured":"Vogt, W.P., Johnson, R.B.: The SAGE dictionary of statistics & methodology: a nontechnical guide for the social sciences. SAGE Publications (2015)","DOI":"10.4135\/9781071909751"},{"key":"11_CR31","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1016\/j.chb.2017.01.049","volume":"71","author":"J Wang","year":"2017","unstructured":"Wang, J., Antonenko, P.D.: Instructor presence in instructional video: effects on visual attention, recall, and perceived learning. Comput. Hum. Behav. 71, 79\u201389 (2017). https:\/\/doi.org\/10.1016\/j.chb.2017.01.049","journal-title":"Comput. Hum. Behav."},{"key":"11_CR32","unstructured":"Winther, P.: MITRE ATT &CK technique t1566: Phishing (2022). https:\/\/attack.mitre.org\/techniques\/T1566\/"}],"container-title":["Lecture Notes in Computer Science","Responsive and Sustainable Educational Futures"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-42682-7_11","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T14:02:31Z","timestamp":1762092151000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-42682-7_11"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031426810","9783031426827"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-42682-7_11","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"28 August 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"EC-TEL","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"European Conference on Technology Enhanced Learning","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Aveiro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 September 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 September 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"ectel2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/ea-tel.eu\/ectel2023","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}