{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,5]],"date-time":"2022-04-05T00:28:46Z","timestamp":1649118526565},"reference-count":17,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2018,4,30]],"date-time":"2018-04-30T00:00:00Z","timestamp":1525046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Datenschutz Datensich"],"published-print":{"date-parts":[[2018,5]]},"DOI":"10.1007\/s11623-018-0945-x","type":"journal-article","created":{"date-parts":[[2018,4,29]],"date-time":"2018-04-29T22:47:37Z","timestamp":1525042057000},"page":"301-306","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Effektiver Schutz vor betr\u00fcgerischen Nachrichten"],"prefix":"10.1007","volume":"42","author":[{"given":"Stephan","family":"Neumann","sequence":"first","affiliation":[]},{"given":"Benjamin","family":"Reinheimer","sequence":"additional","affiliation":[]},{"given":"Melanie","family":"Volkamer","sequence":"additional","affiliation":[]},{"given":"Alexandra","family":"Kunz","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Schwartz","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,30]]},"reference":[{"key":"945_CR1","unstructured":"Federal Bureau of Investigation. FBI warns of dramatic increase in business e-mail scams. https:\/\/www.fbi.gov\/contact-us\/field-offices\/phoenix\/news\/press-releases\/fbi-warns-of-dramatic-increase-inbusiness-e-mail-scams, 2016."},{"issue":"2","key":"945_CR2","first-page":"76","volume":"12","author":"B M Tariq","year":"2007","unstructured":"Banday, M. Tariq, Qadri, Jamel A. Phishing\u2013A Growing Threat to E-Commerce, The Business Review, ISSN: 0972-8384, 12(2), pp. 76\u201383, 2007.","journal-title":"The Business Review"},{"key":"945_CR3","first-page":"14","volume-title":"Network Security","author":"M-D Steve","year":"2016","unstructured":"Mansfield-Devine, Steve. Securing small and medium-size businesses. Network Security 2016.7 (2016): 14\u201320."},{"key":"945_CR4","volume-title":"Anti-Phishing Working Group (APWG)","author":"A Greg","year":"2010","unstructured":"Aaron, Greg, and Rad Rasmussen. Global phishing survey: trends and domain name use in 2H2009. Anti-Phishing Working Group (APWG), Lexington, MA(2010)."},{"key":"945_CR5","first-page":"1","volume":"8","author":"C Lorrie Faith","year":"2008","unstructured":"Cranor, Lorrie Faith. A framework for reasoning about the human in the loop. UPSEC 8 (2008): 1\u201315.","journal-title":"UPSEC"},{"key":"945_CR6","volume-title":"Cyber Security Awareness Campaigns: Why do they fail to change behaviour","author":"B Maria","year":"2014","unstructured":"Bada, Maria, and Angela Sasse. Cyber Security Awareness Campaigns: Why do they fail to change behaviour? (2014)."},{"key":"945_CR7","first-page":"10862","volume-title":"African Journal of Business Management","author":"K Bilal","year":"2011","unstructured":"Khan, Bilal, et al. Effectiveness of information security awareness methods based on psychological theories. African Journal of Business Management 5.26 (2011): 10862."},{"key":"945_CR8","volume-title":"Proceedings of the SIGCHI conference on Human factors in computing systems","author":"K Ponnurangam","year":"2007","unstructured":"Kumaraguru, Ponnurangam, et al. Protecting people from phishing: the design and evaluation of an embedded training email system. Proceedings of the SIGCHI conference on Human factors in computing systems. ACM, 2007."},{"key":"945_CR9","volume-title":"Proceedings of the SIGCHI Conference on Human Factors in Computing Systems","author":"S Steve","year":"2010","unstructured":"Sheng, Steve, et al. Who falls for phish?: a demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. ACM, 2010."},{"key":"945_CR10","volume-title":"Diss. Durham University","author":"A Abdullah M","year":"2009","unstructured":"Alnajim, Abdullah M. Fighting internet fraud: anti-phishing effectiveness for phishing websites detection. Diss. Durham University, 2009."},{"key":"945_CR11","doi-asserted-by":"crossref","unstructured":"Thorndike, Edward L. The fundamentals of learning. (1932).","DOI":"10.1037\/10976-000"},{"key":"945_CR12","first-page":"445","volume-title":"Encyclopedia of Human-Computer Interaction","author":"A Chadia","year":"2004","unstructured":"Abras, Chadia, Diane Maloney-Krichmar, and Jenny Preece. User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction. Thousand Oaks: Sage Publications 37.4 (2004): 445\u2013456."},{"key":"945_CR13","first-page":"24","volume-title":"IEEE Security and Privacy Magazine","author":"K Iacovos","year":"2012","unstructured":"Kirlappos, Iacovos, and Martina Angela Sasse. Security education against phishing: A modest proposal for a major rethink. IEEE Security and Privacy Magazine 10.2 (2012): 24\u201332."},{"key":"945_CR14","unstructured":"Bauer, Lujo, et al. Warning design guidelines. Pittsburgh, PA: Carnegie Mellon University (2013)."},{"key":"945_CR15","first-page":"27","volume-title":"Computers & Security","author":"F Steven M","year":"2006","unstructured":"Furnell, Steven M., Adila Jusoh, and Dimitris Katsabas. The challenges of understanding and using security: A survey of end-users. Computers & Security 25.1 (2006): 27\u201335."},{"key":"945_CR16","first-page":"1","volume-title":"Practical Assessment","author":"D W Joost CF","year":"2010","unstructured":"De Winter, Joost CF, and Dimitra Dodou. Five-Point Likert Items: t Test versus Mann-Whitney-Wilcoxon. Practical Assessment 15.11 (2010): 1\u201316."},{"key":"945_CR17","volume-title":"Anti-Phishing Working Group (APWG)","author":"R Rad","year":"2013","unstructured":"Rasmussen, Rad and Greg Aaron. Anti Phishing Working Group Global Phishing Survey: Trends and Domain Name Use in 1H2013. Anti-Phishing Working Group (APWG), Lexington, MA(2013)."}],"container-title":["Datenschutz und Datensicherheit - DuD"],"original-title":[],"language":"de","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0945-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11623-018-0945-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11623-018-0945-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,30]],"date-time":"2019-04-30T08:40:19Z","timestamp":1556613619000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11623-018-0945-x"}},"subtitle":["Ein Schulungsprogramm zur Erkennung betr\u00fcgerischer Nachrichten f\u00fcr KMU"],"short-title":[],"issued":{"date-parts":[[2018,4,30]]},"references-count":17,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2018,5]]}},"alternative-id":["945"],"URL":"https:\/\/doi.org\/10.1007\/s11623-018-0945-x","relation":{},"ISSN":["1614-0702","1862-2607"],"issn-type":[{"value":"1614-0702","type":"print"},{"value":"1862-2607","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,4,30]]},"assertion":[{"value":"30 April 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}