{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:40:53Z","timestamp":1776102053674,"version":"3.50.1"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319983844","type":"print"},{"value":"9783319983851","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-98385-1_9","type":"book-chapter","created":{"date-parts":[[2018,7,26]],"date-time":"2018-07-26T03:47:49Z","timestamp":1532576869000},"page":"119-134","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":15,"title":["Developing and Evaluating a Five Minute Phishing Awareness Video"],"prefix":"10.1007","author":[{"given":"Melanie","family":"Volkamer","sequence":"first","affiliation":[]},{"given":"Karen","family":"Renaud","sequence":"additional","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Philipp","family":"Rack","sequence":"additional","affiliation":[]},{"given":"Marco","family":"Ghiglieri","sequence":"additional","affiliation":[]},{"given":"Peter","family":"Mayer","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Nina","family":"Gerber","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,27]]},"reference":[{"key":"9_CR1","unstructured":"Anti-Phishing Working Group: Phishing Activity Trends Report, 4th Quater 2016 (2016). https:\/\/docs.apwg.org\/reports\/apwg_trends_report_q4_2016.pdf . Accessed 18 May 2017"},{"key":"9_CR2","doi-asserted-by":"crossref","unstructured":"Arachchilage, N.A.G., Cole, M.: Design a mobile game for home computer users to prevent from \u201cphishing attacks\u201d. In: i-Society 2011: International Conference on Information Society, pp. 485\u2013489. IEEE, London (2011)","DOI":"10.1109\/i-Society18435.2011.5978543"},{"key":"9_CR3","doi-asserted-by":"crossref","unstructured":"Asudeh, O., Wright, M.: Poster: phishing website detection with a multiphase framework to find visual similarity. In: CCS 2016, pp. 1790\u20131792. ACM (2016)","DOI":"10.1145\/2976749.2989050"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Baslyman, M., Chiasson, S.: \u201cSmells Phishy?\u201d: an educational game about online phishing scams. In: eCrime 2016: APWG Symposium on Electronic Crime Research, pp. 1\u201311. IEEE, Toronto (2016)","DOI":"10.1109\/ECRIME.2016.7487946"},{"key":"9_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-319-11851-2_14","volume-title":"Security and Trust Management","author":"G Canova","year":"2014","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Borza, R.: NoPhish: an anti-phishing education app. In: Mauw, S., Jensen, C.D. (eds.) STM 2014. LNCS, vol. 8743, pp. 188\u2013192. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-11851-2_14"},{"key":"9_CR6","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-319-18500-2_8","volume-title":"Information Security Education Across the Curriculum","author":"G Canova","year":"2015","unstructured":"Canova, G., et al.: Learn to spot phishing URLs with the Android NoPhish App. In: Bishop, M., Miloslavskaya, N., Theocharidou, M. (eds.) WISE 2015. IAICT, vol. 453, pp. 87\u2013100. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-18500-2_8"},{"key":"9_CR7","doi-asserted-by":"crossref","unstructured":"Canova, G., Volkamer, M., Bergmann, C., Reinheimer, B.: NoPhish app evaluation: lab and retention study. Internet Society, USEC (2015)","DOI":"10.14722\/usec.2015.23009"},{"issue":"1","key":"9_CR8","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.106","volume":"12","author":"DD Caputo","year":"2014","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE S & P 12(1), 28\u201338 (2014)","journal-title":"IEEE S & P"},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/MSP.2013.106","volume":"12","author":"DD Caputo","year":"2014","unstructured":"Caputo, D.D., Pfleeger, S.L., Freeman, J.D., Johnson, M.E.: Going spear phishing: exploring embedded training and awareness. IEEE Secur. Priv. 12(1), 28\u201338 (2014). https:\/\/doi.org\/10.1109\/MSP.2013.106","journal-title":"IEEE Secur. Priv."},{"key":"9_CR10","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"457","DOI":"10.1007\/978-3-642-30436-1_37","volume-title":"Information Security and Privacy Research","author":"R Dodge","year":"2012","unstructured":"Dodge, R., Coronges, K., Rovira, E.: Empirical benefits of training to phishing susceptibility. In: Gritzalis, D., Furnell, S., Theoharidou, M. (eds.) SEC 2012. IAICT, vol. 376, pp. 457\u2013464. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-30436-1_37"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Dong, X., Clark, J.A., Jacob, J.: Modelling user-phishing interaction. In: Human System Interactions, pp. 627\u2013632. IEEE (2008)","DOI":"10.1109\/HSI.2008.4581513"},{"key":"9_CR12","doi-asserted-by":"crossref","unstructured":"Downs, J.S., Holbrook, M.B., Cranor, L.F.: Decision strategies and susceptibility to phishing. In: SOUPS, pp. 79\u201390. ACM, Pittsburgh (2006)","DOI":"10.1145\/1143120.1143131"},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Hale, M., Gamble, R.: Toward increasing awareness of suspicious content through game play. In: SERVICES 2014, pp. 113\u2013120. IEEE (2014)","DOI":"10.1109\/SERVICES.2014.30"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Hale, M.L., Gamble, R.F., Gamble, P.: CyberPhishing: a game-based platform for phishing awareness testing. In: Hawai\u2019i International Conference on System Sciences, pp. 5260\u20135269. IEEE, Kauai (2015)","DOI":"10.1109\/HICSS.2015.670"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Han, X., Kheir, N., Balzarotti, D.: PhishEye: live monitoring of sandboxed phishing kits. In: CCS 2016, pp. 1402\u20131413. ACM (2016)","DOI":"10.1145\/2976749.2978330"},{"key":"9_CR16","doi-asserted-by":"crossref","unstructured":"Helser, S.: Fit: Identity theft education: study of text-based versus game-based learning. In: ISTAS 2015, pp. 1\u20134. IEEE, Dublin (2015)","DOI":"10.1109\/ISTAS.2015.7439437"},{"issue":"10","key":"9_CR17","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"356","DOI":"10.1007\/978-3-540-77366-5_32","volume-title":"Financial Cryptography and Data Security","author":"M Jakobsson","year":"2007","unstructured":"Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.-K.: What instills trust? A qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007. LNCS, vol. 4886, pp. 356\u2013361. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-77366-5_32"},{"issue":"6","key":"9_CR19","doi-asserted-by":"publisher","first-page":"584","DOI":"10.1080\/0144929X.2011.632650","volume":"32","author":"K Jansson","year":"2013","unstructured":"Jansson, K., von Solms, R.: Phishing for phishing awareness. Behav. Inf. Technol. 32(6), 584\u2013593 (2013)","journal-title":"Behav. Inf. Technol."},{"key":"9_CR20","unstructured":"Kauer, M., Pfeiffer, T., Volkamer, M., Theuerling, H., Bruder, R.: It is not about the design \u2013 it is about the content! Making warnings more efficient by communicating risks appropriately. In: Sicherheit, vol. 195. GI (2012)"},{"key":"9_CR21","doi-asserted-by":"crossref","unstructured":"Kawakami, M., Yasuda, H., Sasaki, R.: Development of an E-learning content-making system for information security (elsec) and its application to anti-phishing education. International Conference on E-Education. E-Business, E-Management and E-Learning, pp. 7\u201311. IEEE, Sanya (2010)","DOI":"10.1109\/IC4E.2010.63"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: School of Phish: a real-world evaluation of anti-phishing training. In: SOUPS, p. 3. ACM (2009)","DOI":"10.1145\/1572532.1572536"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., et al.: Getting users to pay attention to anti-phishing education: evaluation of retention and transfer. In: APWG: eCrime, pp. 70\u201381. ACM (2007)","DOI":"10.1145\/1299015.1299022"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Lessons from a real world evaluation of anti-phishing training. In: APWG: eCrime, pp. 1\u201312. IEEE (2008)","DOI":"10.1109\/ECRIME.2008.4696970"},{"issue":"2","key":"9_CR25","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1754393.1754396","volume":"10","author":"P Kumaraguru","year":"2010","unstructured":"Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L.F., Hong, J.: Teaching Johnny not to fall for phish. TOIT 10(2), 7 (2010)","journal-title":"TOIT"},{"key":"9_CR26","unstructured":"Kunz, A., Volkamer, M., Stockhardt, S., Palberg, S., Lottermann, T., Piegert, E.: NoPhish: evaluation of a web application that teaches people being aware of phishing attacks. Informatik (2016)"},{"key":"9_CR27","unstructured":"Lastdrager, E., Gallardo, I.C., Hartel, P.H., Junger, M.: How effective is anti-phishing training for children? In: SOUPS, pp. 229\u2013239 (2017)"},{"key":"9_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"199","DOI":"10.1007\/978-3-319-64483-7_13","volume-title":"Trust, Privacy and Security in Digital Business","author":"S Neumann","year":"2017","unstructured":"Neumann, S., Reinheimer, B., Volkamer, M.: Don\u2019t be deceived: the message might be fake. In: Lopez, J., Fischer-H\u00fcbner, S., Lambrinoudakis, C. (eds.) TrustBus 2017. LNCS, vol. 10442, pp. 199\u2013214. Springer, Cham (2017). https:\/\/doi.org\/10.1007\/978-3-319-64483-7_13"},{"key":"9_CR29","doi-asserted-by":"crossref","unstructured":"Oliveira, D., et al.: Dissecting spear phishing emails for older vs. young adults: on the interplay of weapons of influence and life domains in predicting susceptibility to phishing. In: CHI 2017, pp. 6412\u20136424. ACM (2017)","DOI":"10.1145\/3025453.3025831"},{"key":"9_CR30","doi-asserted-by":"crossref","unstructured":"Scott, M.J., Ghinea, G., Arachchilage, N.A.G.: Assessing the role of conceptual knowledge in an anti-phishing educational game. In: ICALT, p. 218. IEEE (2014)","DOI":"10.1109\/ICALT.2014.70"},{"key":"9_CR31","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L.F., Downs, J.: Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In: CHI, pp. 373\u2013382. ACM (2010)","DOI":"10.1145\/1753326.1753383"},{"key":"9_CR32","doi-asserted-by":"crossref","unstructured":"Sheng, S., et al.: Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: SOUPS, pp. 88\u201399. ACM (2007)","DOI":"10.1145\/1280680.1280692"},{"key":"9_CR33","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1007\/978-3-319-33630-5_10","volume-title":"ICT Systems Security and Privacy Protection","author":"S Stockhardt","year":"2016","unstructured":"Stockhardt, S., et al.: Teaching phishing-security: which way is best? In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 135\u2013149. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_10"},{"issue":"1","key":"9_CR34","first-page":"45","volume":"20","author":"JCY Sun","year":"2017","unstructured":"Sun, J.C.Y., Kuo, C.Y., Hou, H.T., Yu-Yan, L.: Exploring learners\u2019 sequential behavioral patterns, flow experience, and learning performance in an anti-phishing educational game. J. Educ. Technol. Soc. 20(1), 45 (2017)","journal-title":"J. Educ. Technol. Soc."},{"key":"9_CR35","doi-asserted-by":"publisher","first-page":"73","DOI":"10.1016\/j.compedu.2016.12.003","volume":"106","author":"JCY Sun","year":"2017","unstructured":"Sun, J.C.Y., Yeh, K.P.C.: The effects of attention monitoring with EEG biofeedback on university students\u2019 attention and self-efficacy: the case of anti-phishing instructional materials. Comput. Educ. 106, 73\u201382 (2017)","journal-title":"Comput. Educ."},{"key":"9_CR36","doi-asserted-by":"crossref","unstructured":"Tseng, S.S., Chen, K.Y., Lee, T.J., Weng, J.F.: Automatic content generation for anti-phishing education game. In: ICECE, pp. 6390\u20136394. IEEE (2011)","DOI":"10.1109\/ICECENG.2011.6056921"},{"key":"9_CR37","unstructured":"Verizon: Verizon\u2019s. http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2017\/ (2017). Accessed 18 May 2017"},{"key":"9_CR38","doi-asserted-by":"crossref","unstructured":"Volkamer, M., Stockhardt, S., Bartsch, S., Kauer, M.: Adopting the CMU\/APWG anti-phishing landing page idea for germany. In: 2013 Third Workshop on Socio-Technical Aspects in Security and Trust (STAST), pp. 46\u201352. IEEE (2013)","DOI":"10.1109\/STAST.2013.12"},{"key":"9_CR39","doi-asserted-by":"publisher","first-page":"372","DOI":"10.1108\/ICS-07-2015-0032","volume":"24","author":"M Volkamer","year":"2016","unstructured":"Volkamer, M., Renaud, K., Gerber, P.: Spot the phish by checking the pruned URL. Inf. Comput. Secur. 24, 372\u2013385 (2016)","journal-title":"Inf. Comput. Secur."},{"key":"9_CR40","series-title":"IFIP Advances in Information and Communication Technology","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/978-3-319-33630-5_12","volume-title":"ICT Systems Security and Privacy Protection","author":"M Volkamer","year":"2016","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B.: TORPEDO: TOoltip-poweRed phishing email DetectiOn. In: Hoepman, J.-H., Katzenbeisser, S. (eds.) SEC 2016. IAICT, vol. 471, pp. 161\u2013175. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-33630-5_12"},{"key":"9_CR41","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1016\/j.cose.2017.02.004","volume":"71","author":"M Volkamer","year":"2017","unstructured":"Volkamer, M., Renaud, K., Reinheimer, B., Kunz, A.: User experiences of TORPEDO: TOoltip-powered phishing email detection. Comput. Secur. 71, 100\u2013113 (2017)","journal-title":"Comput. Secur."},{"key":"9_CR42","doi-asserted-by":"crossref","unstructured":"Wen, Z.A., Li, Y., Wade, R., Huang, J., Wang, A.: What.Hack: learn phishing email defence the fun way. In: CHI EA 2017, pp. 234\u2013237. ACM (2017)","DOI":"10.1145\/3027063.3048412"},{"key":"9_CR43","unstructured":"Wombat Security Technologies: State of the Phish: Effectively Reducing Phishing and Malware Infections (2016). http:\/\/pittsburgh.issa.org\/ISSA%20Pittsburgh%20Wombat%20Security%20May%206%202016.pdf . Accessed 18 May 2017"},{"key":"9_CR44","doi-asserted-by":"crossref","unstructured":"Yang, C.C., Tseng, S.S., Lee, T.J., Weng, J.F., Chen, K.: Building an anti-phishing game to enhance network security literacy learning. In: ICALT, pp. 121\u2013123 (2012)","DOI":"10.1109\/ICALT.2012.174"},{"issue":"1","key":"9_CR45","doi-asserted-by":"publisher","first-page":"1466","DOI":"10.1177\/1541931214581306","volume":"58","author":"OA Zielinska","year":"2014","unstructured":"Zielinska, O.A., Tembe, R., Hong, K.W., Ge, X., Murphy-Hill, E., Mayhorn, C.B.: One phish, two phish, how to avoid the internet phish. Hum. Factors Ergon. Soc. 58(1), 1466\u20131470 (2014)","journal-title":"Hum. Factors Ergon. Soc."}],"container-title":["Lecture Notes in Computer Science","Trust, Privacy and Security in Digital Business"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-98385-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,6]],"date-time":"2025-07-06T01:31:01Z","timestamp":1751765461000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-98385-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319983844","9783319983851"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-98385-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}