{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T16:31:54Z","timestamp":1776097914401,"version":"3.50.1"},"publisher-location":"Cham","reference-count":32,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319184999","type":"print"},{"value":"9783319185002","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-18500-2_8","type":"book-chapter","created":{"date-parts":[[2015,4,29]],"date-time":"2015-04-29T11:05:41Z","timestamp":1430305541000},"page":"87-100","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Learn to Spot Phishing URLs with the Android NoPhish App"],"prefix":"10.1007","author":[{"given":"Gamze","family":"Canova","sequence":"first","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Clemens","family":"Bergmann","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Borza","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Stockhardt","sequence":"additional","affiliation":[]},{"given":"Ralf","family":"Tenberg","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-04117-4_23","volume-title":"Handbook of Information and Communication Security","author":"Z Ramzan","year":"2010","unstructured":"Ramzan, Z.: Phishing attacks and countermeasures. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 433\u2013448. Springer, Heidelberg (2010)"},{"key":"8_CR2","volume-title":"Global Phishing Survey: Trends and Domain Name Use in 1h2014","author":"G Aaron","year":"2014","unstructured":"Aaron, G., Rasmussen, R., Routt, A.: Global Phishing Survey: Trends and Domain Name Use in 1h2014. Anti-Phishing Working Group (APWG), Lexington (2014)"},{"key":"8_CR3","unstructured":"Netcraft: Netcraft extension. \nhttp:\/\/toolbar.netcraft.com\n\n. Accessed 05 June 2014"},{"key":"8_CR4","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd Symposium on Usable Privacy and Security, SOUPS 2007, pp. 88\u201399. ACM, New York (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"8_CR5","doi-asserted-by":"crossref","unstructured":"Dhamija, R., Tygar, J.D., Hearst, M.: Why phishing works. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 581\u2013590. ACM (2006)","DOI":"10.1145\/1124772.1124861"},{"key":"8_CR6","doi-asserted-by":"crossref","unstructured":"Lin, E., Greenberg, S., Trotter, E., Ma, D., Aycock, J.: Does domain highlighting help people identify phishing sites? In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 2075\u20132084. ACM (2011)","DOI":"10.1145\/1978942.1979244"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Li, T., Han, F., Ding, S., Chen, Z.: Larx: large-scale anti-phishing by retrospective data-exploring based on a cloud computing platform. In: 2011 Proceedings of 20th International Conference on Computer Communications and Networks (ICCCN), pp. 1\u20135. IEEE (2011)","DOI":"10.1109\/ICCCN.2011.6005822"},{"key":"8_CR8","unstructured":"Bundesamt f\u00fcr Sicherheit in der Informationstechnik: Phishing: Gef\u00e4hrliche umleitung f\u00fcr ihre passw\u00f6rter. \nhttps:\/\/www.bsi-fuer-buerger.de\/BSIFB\/DE\/GefahrenImNetz\/Phishing\/phishing_node.html\n\n. Accessed 26 May 2014"},{"key":"8_CR9","unstructured":"OnGuardOnline.gov: Phishing. \nhttp:\/\/www.onguardonline.gov\/phishing\n\n. Accessed 26 May 2014"},{"key":"8_CR10","unstructured":"Online, S.S.: Race to stay safe. \nhttps:\/\/www.staysecureonline.com\/staying-safe-online\n\n. Accessed 26 May 2014"},{"key":"8_CR11","unstructured":"SonicWALL: Sonicwall phishing iq test. \nhttp:\/\/www.sonicwall.com\/furl\/phishing\n\n. Accessed 26 May 2014"},{"key":"8_CR12","unstructured":"Wombat Security Technologies: Anti-phishing phyllis. \nhttp:\/\/www.wombatsecurity.com\/antiphishingphyllis\n\n. Accessed 26 May 2014"},{"key":"8_CR13","unstructured":"Aleven, V., Chan, S.H., Moore, A., Sung, A.: Anti-phishing phil v2.0. \nhttp:\/\/jackieweber.net\/Projects\/phil.html\n\n. Accessed 05 June 2014"},{"key":"8_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Heidelberg (2014)"},{"key":"8_CR15","unstructured":"Boodaei, M.: Mobile users three times more vulnerable to phishing attacks (2011). \nhttp:\/\/www.trusteer.com\/blog\/mobile-users-three-times-more-vulnerable-to-phishing-attacks\n\n. Accessed 28 May 2014"},{"key":"8_CR16","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: Proceedings of the 2007 ACM Workshop on Recurring Malcode, pp. 1\u20138. ACM (2007)","DOI":"10.1145\/1314389.1314391"},{"issue":"2","key":"8_CR17","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1145\/503124.503156","volume":"45","author":"E Gabrilovich","year":"2002","unstructured":"Gabrilovich, E., Gontmakher, A.: The homograph attack. Commun. ACM 45(2), 128 (2002)","journal-title":"Commun. ACM"},{"key":"8_CR18","unstructured":"Larkin, E.: Spot the tiny phishing trick (2009). \nhttp:\/\/www.pcworld.com\/article\/161232\/tinyphish.html\n\n. Accessed 26 May 2014"},{"key":"8_CR19","doi-asserted-by":"crossref","unstructured":"Alnajim, A.: Fighting internet fraud: anti-phishing effectiveness for phishing websites detection. Ph.D. thesis, Durham University (2009)","DOI":"10.1109\/ICDIM.2008.4746717"},{"key":"8_CR20","doi-asserted-by":"publisher","DOI":"10.1037\/10976-000","volume-title":"The Fundamentals of Learning","author":"EL Thorndike","year":"1932","unstructured":"Thorndike, E.L.: The Fundamentals of Learning. Teachers College Bureau of Publications, New York (1932)"},{"key":"8_CR21","unstructured":"Murphy, C.: Why games work and the science of learning. In: Interservice, Interagency Training, Simulations, and Education Conference (2011)"},{"key":"8_CR22","unstructured":"Badgeville: Game mechanics. \nhttp:\/\/badgeville.com\/wiki\/Game_Mechanics\n\n. Accessed 10 June 2014"},{"key":"8_CR23","unstructured":"Siering, G.: Gamification: using game-like elements to motivate and engage students (2012). \ncitl.indiana.edu\/news\/newsStories\/dir-mar2012.php\n\n. Accessed 10 June 2014"},{"key":"8_CR24","volume-title":"Encyclopedia of Human-Computer Interaction","author":"C Abras","year":"2004","unstructured":"Abras, C., Maloney-krichmar, D., Preece, J.: User-centered design. In: Bainbridge, W. (ed.) Encyclopedia of Human-Computer Interaction. Sage Publications, Thousand Oaks (2004)"},{"key":"8_CR25","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Stockhardt, S., Bartsch, S., Kauer, M.: Adopting the CMU\/APWG anti-phishing landing page idea for germany. In: 2013 Third Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 46\u201352. IEEE (2013)","DOI":"10.1109\/STAST.2013.12"},{"key":"8_CR26","volume-title":"Computer System Security: Basic Concepts and Solved Exercises","author":"G Avoine","year":"2004","unstructured":"Avoine, G., Junod, P., Oechslin, P.: Computer System Security: Basic Concepts and Solved Exercises. EPFL Press, Lausanne (2004)"},{"key":"8_CR27","unstructured":"Simon, D.P.: The art of guerilla usability testing (2013). \nhttp:\/\/www.uxbooth.com\/articles\/the-art-of-guerilla-usability-testing\/\n\n. Accessed 26 May 2014"},{"key":"8_CR28","unstructured":"Stilversprechend: Stilversprechend. \nhttp:\/\/stilversprechend.de\/index.html\n\n. Accessed 26 May 2014"},{"key":"8_CR29","unstructured":"Leicht Lesbar: Testen sie ihren text. \nhttp:\/\/leichtlesbar.ch\/html\n\n. Accessed 26 May 2014"},{"key":"8_CR30","unstructured":"Sch\u00f6ll, P.: Flesch-index berechnen. \nhttp:\/\/www.fleschindex.de\n\n. Accessed 26 May 2014"},{"key":"8_CR31","series-title":"Abhandlung: Philosophische Fakult\u00e4t I, 1977","volume-title":"Wie verst\u00e4ndlich sind unsere Zeitungen?","author":"T Amstad","year":"1978","unstructured":"Amstad, T.: Wie verst\u00e4ndlich sind unsere Zeitungen?. Abhandlung: Philosophische Fakult\u00e4t I, 1977. Studenten-Schreib-Service, Z\u00fcrich (1978)"},{"key":"8_CR32","doi-asserted-by":"crossref","unstructured":"Jansson, K., von Solms, R.: Simulating malicious emails to educate end users on-demand. In: 2011 3rd Symposium on Web Society (SWS), pp. 74\u201380 (2011)","DOI":"10.1109\/SWS.2011.6101274"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Security Education Across the Curriculum"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-18500-2_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,20]],"date-time":"2020-05-20T14:25:09Z","timestamp":1589984709000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-18500-2_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319184999","9783319185002"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-18500-2_8","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}