. /. Reisen-., https://epaper.bild.de/ https://www.gmx.net/produkte/mail/... https://secure.ikea.com, Pre and Post Questionnaire Post Questionnaire only Original https

I. Phishing, U. Random, and /. , https://events-ma.de/www.gutefrage.net... https://web.de.emailclient.com/ https://login.live.dub123.com/login.srf... Name Extension https, User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction, pp.445-456, 2004.

M. Bada, A. Sasse, and J. R. Nurse, Cyber Security Awareness Campaigns: Why do they fail to change behaviour?, International Conference on Cyber Security for Sustainable Society, pp.118-131, 2015.

J. Brooke, SUS-A quick and dirty usability scale. Usability evaluation in industry 189, pp.4-7, 1996.

G. Canova, M. Volkamer, C. Bergmann, and R. Borza, NoPhish: An Anti-Phishing Education App, pp.188-192, 2014.
DOI : 10.1007/978-3-319-11851-2_14

G. Canova, M. Volkamer, C. Bergmann, and B. Reinheimer, NoPhish App Evaluation: Lab and Retention Study, Proceedings 2015 Workshop on Usable Security, 2015.
DOI : 10.14722/usec.2015.23009

S. Das, H. Kim, L. A. Dabbish, and J. I. Hong, The effect of social influence on security sensitivity, In: SOUPS, vol.14, 2014.

M. S. Desai, T. Richards, and J. P. Eddy, A field experiment: instructor-based training vs. computer-based training, Journal of Instructional Psychology, vol.27, issue.4, p.239, 2000.

A. P. Felt and D. Wagner, Phishing on mobile devices, 2011.

S. Garera, N. Provos, M. Chew, and A. D. Rubin, A framework for detection and measurement of phishing attacks, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.1-8, 2007.
DOI : 10.1145/1314389.1314391

A. Greg and R. Rasmussen, Global Phishing Survey: Trends and Domain Name Use in 2H2014, 2015.

S. S. Harrington, A comparison of computer-based and instructor-led training for longterm care staff, The Journal of Continuing Education in Nursing, vol.33, issue.1, p.39, 2002.

B. Khan, K. S. Alghathbar, S. I. Nabi, and M. K. Khan, Effectiveness of information security awareness methods based on psychological theories, African Journal of Business Management Academic Journals, vol.5, issue.26, pp.10862-10868, 2011.

P. Kumaraguru, Y. Rhee, A. Acquisti, L. F. Cranor, J. Hong et al., Protecting people from phishing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.905-914, 2007.
DOI : 10.1145/1240624.1240760

J. Ma, L. K. Saul, S. Savage, and G. M. Voelker, Beyond blacklists, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1245-1254, 2009.
DOI : 10.1145/1557019.1557153

B. Y. Ng, A. Kankanhalli, and Y. C. Xu, Studying users' computer security behavior: A health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009.
DOI : 10.1016/j.dss.2008.11.010

Z. Ramzan, Phishing Attacks and Countermeasures, Handbook of Information and Communication Security, pp.433-448, 2010.
DOI : 10.1007/978-3-642-04117-4_23

D. Reid, Knowledge retention in computer-based training, 2001.

B. Schilliger and R. Schmid, Entwickeln einer Awareness-Kampagne für einen sicheren Umgang mit dem Internet an mittelgrossen Berufs-oder Maturitätsschulen, 2010.

S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, Who falls for phish?, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.373-382, 2010.
DOI : 10.1145/1753326.1753383

S. Sheng, B. Magnien, P. Kumaraguru, A. Acquisti, L. F. Cranor et al., Anti-Phishing Phil, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.88-99, 2007.
DOI : 10.1145/1280680.1280692

E. L. Thorndike, The fundamentals of learning, 1932.
DOI : 10.1037/10976-000