{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:53Z","timestamp":1776102053524,"version":"3.50.1"},"publisher-location":"Cham","reference-count":22,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319336299","type":"print"},{"value":"9783319336305","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-33630-5_10","type":"book-chapter","created":{"date-parts":[[2016,5,10]],"date-time":"2016-05-10T08:10:12Z","timestamp":1462867812000},"page":"135-149","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":28,"title":["Teaching Phishing-Security: Which Way is Best?"],"prefix":"10.1007","author":[{"given":"Simon","family":"Stockhardt","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Rack","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Lehmann","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,11]]},"reference":[{"key":"10_CR1","unstructured":"Abras, C., Maloney-Krichmar, D., Preece, J.: User-centered design. In: Bainbridge, W. (ed.) Encyclopedia of Human-Computer Interaction, vol. 37(4), pp. 445\u2013456. Sage Publications (2004)"},{"key":"10_CR2","unstructured":"Bada, M., Sasse, A., Nurse, J.R.C.: Cyber security awareness campaigns: Why do they fail to change behaviour?. In: International Conference on Cyber Security for Sustainable Society, pp. 118\u2013131. Global Cyber Security Centre (2015)"},{"key":"10_CR3","unstructured":"Brooke, J.: SUS-A quick and dirty usability scale. In: Usability Evaluation in Industry, vol. 189(194), pp. 4\u20137. Taylor and Francis (1996)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: An anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Heidelberg (2014)"},{"key":"10_CR5","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/978-3-319-18500-2_8","volume-title":"Information Security Education Across the Curriculum","author":"G Canova","year":"2015","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R., Reinheimer, B., Stockhardt, S., Tenberg, R.: Learn to spot phishing URLs with the android NoPhish app. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) Information Security Education Across the Curriculum. IFIP AICT, vol. 453, pp. 87\u2013100. Springer, Heidelberg (2015)"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. In: USEC 2015. Internet Society (2015)","DOI":"10.14722\/usec.2015.23009"},{"key":"10_CR7","unstructured":"Das, S., Kim, H., Dabbish, L.A., Hong, J.I.: The effect of social influence on security sensitivity. In: SOUPS, vol. 14. ACM (2014)"},{"issue":"4","key":"10_CR8","first-page":"239","volume":"27","author":"MS Desai","year":"2000","unstructured":"Desai, M.S., Richards, T., Eddy, J.P.: A field experiment: instructor-based training vs. computer-based training. J. Instr. Psychol. 27(4), 239 (2000). George Uhlig Publisher","journal-title":"J. Instr. Psychol."},{"key":"10_CR9","unstructured":"Felt, A.P., Wagner, D.: Phishing on mobile devices. USEC 2011, Internet Society\u00a0(2011)"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Garera, S., Provos, N., Chew, M., Rubin, A.D.: A framework for detection and measurement of phishing attacks. In: ACM workshop on Recurring malcode, pp. 1\u20138. ACM (2007)","DOI":"10.1145\/1314389.1314391"},{"key":"10_CR11","unstructured":"Greg, A., Rasmussen, R.: Global Phishing Survey: Trends and Domain Name Use in 2H2014 (2015). \n                    http:\/\/internetidentity.com\/wp-content\/uploads\/2015\/05\/APWG_Global_Phishing_Report_2H_2014.pdf\n                    \n                  . Accessed 13 March 2016"},{"issue":"1","key":"10_CR12","doi-asserted-by":"crossref","first-page":"39","DOI":"10.3928\/0022-0124-20020101-08","volume":"33","author":"SS Harrington","year":"2002","unstructured":"Harrington, S.S., et al.: A comparison of computer-based and instructor-led training for long-term care staff. J. Contin. Educ. Nurs. 33(1), 39 (2002)","journal-title":"J. Contin. Educ. Nurs."},{"issue":"26","key":"10_CR13","first-page":"10862","volume":"5","author":"B Khan","year":"2011","unstructured":"Khan, B., Alghathbar, K.S., Nabi, S.I., Khan, M.K.: Effectiveness of information security awareness methods based on psychological theories. Afr. J. Bus. Manage. 5(26), 10862\u201310868 (2011). Academic Journals","journal-title":"Afr. J. Bus. Manage."},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Protecting people from phishing: the design and evaluation of an embedded training email system. In: CHI, pp. 905\u2013914. ACM (2007)","DOI":"10.1145\/1240624.1240760"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Ma, J., Saul, L.K., Savage, S., Voelker, G.M.: Beyond blacklists: learning to detect malicious web sites from suspicious URLs. In: SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1245\u20131254. ACM (2009)","DOI":"10.1145\/1557019.1557153"},{"issue":"4","key":"10_CR16","doi-asserted-by":"publisher","first-page":"815","DOI":"10.1016\/j.dss.2008.11.010","volume":"46","author":"BY Ng","year":"2009","unstructured":"Ng, B.Y., Kankanhalli, A., Xu, Y.C.: Studying users\u2019 computer security behavior: A health belief perspective. Decis. Support Syst. 46(4), 815\u2013825 (2009). Elsevier","journal-title":"Decis. Support Syst."},{"key":"10_CR17","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1007\/978-3-642-04117-4_23","volume-title":"Handbook of Information and Communication Security","author":"Z Ramzan","year":"2010","unstructured":"Ramzan, Z.: Phishing attacks and countermeasures. In: Stavroulakis, P., Stamp, M. (eds.) Handbook of Information and Communication Security, pp. 433\u2013448. Springer, Heidelberg (2010)"},{"key":"10_CR18","volume-title":"Knowledge Retention in Computer-Based Training","author":"D Reid","year":"2001","unstructured":"Reid, D.: Knowledge Retention in Computer-Based Training. University of Calgary, Calgary (2001)"},{"key":"10_CR19","unstructured":"Schilliger, B., Schmid, R.: Entwickeln einer Awareness-Kampagne f\u00fcr einen sicheren Umgang mit dem Internet an mittelgrossen Berufs-oder Maturit\u00e4tsschulen. Ph.D. thesis, Hochschule Luzern, Wirtschaft (2010)"},{"key":"10_CR20","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. In: CHI, pp. 373\u2013382. ACM (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"10_CR21","doi-asserted-by":"crossref","unstructured":"Sheng, S., Magnien, B., Kumaraguru, P., Acquisti, A., Cranor, L.F., Hong, J., Nunge, E.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: SOUPS, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"10_CR22","doi-asserted-by":"publisher","DOI":"10.1037\/10976-000","volume-title":"The Fundamentals of Learning","author":"EL Thorndike","year":"1932","unstructured":"Thorndike, E.L.: The Fundamentals of Learning. Teachers College Bureau of Publications, New York (1932)"}],"container-title":["IFIP Advances in Information and Communication Technology","ICT Systems Security and Privacy Protection"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-33630-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,13]],"date-time":"2020-05-13T00:03:41Z","timestamp":1589328221000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-33630-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319336299","9783319336305"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-33630-5_10","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"11 May 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}