{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:41Z","timestamp":1776102041382,"version":"3.50.1"},"publisher-location":"Cham","reference-count":9,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319118505","type":"print"},{"value":"9783319118512","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11851-2_14","type":"book-chapter","created":{"date-parts":[[2014,9,6]],"date-time":"2014-09-06T06:55:22Z","timestamp":1409986522000},"page":"188-192","source":"Crossref","is-referenced-by-count":31,"title":["NoPhish: An Anti-Phishing Education App"],"prefix":"10.1007","author":[{"given":"Gamze","family":"Canova","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Clemens","family":"Bergmann","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Borza","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-04117-4_23","volume-title":"Handbook of Information and Communication Security","author":"Z. Ramzan","year":"2010","unstructured":"Ramzan, Z.: Phishing attacks and countermeasures. In: Handbook of Information and Communication Security, pp. 433\u2013448. Springer, Heidelberg (2010)"},{"key":"14_CR2","unstructured":"Aaron, G., Rasmussen, R., Routt, A.: Global phishing survey: Trends and domain name use in 2h2013. Anti-Phishing Working Group (2014)"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish. In: SOUPS, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: SIGCHI. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: SIGCHI, pp. 2075\u20132084. ACM (2011)","DOI":"10.1145\/1978942.1979244"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Li, T., Han, F., Ding, S., Chen, Z.: Larx: Large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: ICCCN, pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/ICCCN.2011.6005822"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Thorndike, E.L.: The fundamentals of learning. Teachers College Bureau of Publications (1932)","DOI":"10.1037\/10976-000"},{"key":"14_CR8","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Stockhardt, S., Bartsch, S., Kauer, M.: Adopting the cmu\/apwg anti-phishing landing page idea for germany. In: STAST, pp. 46\u201352. IEEE (2013)","DOI":"10.1109\/STAST.2013.12"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Jansson, K., von Solms, R.: Simulating malicious emails to educate end users on-demand. In: 2011 3rd Symposium on Web Society (SWS), pp. 74\u201380 (2011)","DOI":"10.1109\/SWS.2011.6101274"}],"container-title":["Lecture Notes in Computer Science","Security and Trust Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11851-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T15:57:13Z","timestamp":1558972633000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11851-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319118505","9783319118512"],"references-count":9,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11851-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}