https://epaper.bild.de/ https://www.gmx.net/produkte/mail/... https://secure.ikea.com, Pre and Post Questionnaire Post Questionnaire only Original https ,
https://events-ma.de/www.gutefrage.net... https://web.de.emailclient.com/ https://login.live.dub123.com/login.srf... Name Extension https, User-centered design. Bainbridge, W. Encyclopedia of Human-Computer Interaction, pp.445-456, 2004. ,
Cyber Security Awareness Campaigns: Why do they fail to change behaviour?, International Conference on Cyber Security for Sustainable Society, pp.118-131, 2015. ,
SUS-A quick and dirty usability scale. Usability evaluation in industry 189, pp.4-7, 1996. ,
NoPhish: An Anti-Phishing Education App, pp.188-192, 2014. ,
DOI : 10.1007/978-3-319-11851-2_14
NoPhish App Evaluation: Lab and Retention Study, Proceedings 2015 Workshop on Usable Security, 2015. ,
DOI : 10.14722/usec.2015.23009
The effect of social influence on security sensitivity, In: SOUPS, vol.14, 2014. ,
A field experiment: instructor-based training vs. computer-based training, Journal of Instructional Psychology, vol.27, issue.4, p.239, 2000. ,
Phishing on mobile devices, 2011. ,
A framework for detection and measurement of phishing attacks, Proceedings of the 2007 ACM workshop on Recurring malcode, WORM '07, pp.1-8, 2007. ,
DOI : 10.1145/1314389.1314391
Global Phishing Survey: Trends and Domain Name Use in 2H2014, 2015. ,
A comparison of computer-based and instructor-led training for longterm care staff, The Journal of Continuing Education in Nursing, vol.33, issue.1, p.39, 2002. ,
Effectiveness of information security awareness methods based on psychological theories, African Journal of Business Management Academic Journals, vol.5, issue.26, pp.10862-10868, 2011. ,
Protecting people from phishing, Proceedings of the SIGCHI conference on Human factors in computing systems , CHI '07, pp.905-914, 2007. ,
DOI : 10.1145/1240624.1240760
Beyond blacklists, Proceedings of the 15th ACM SIGKDD international conference on Knowledge discovery and data mining, KDD '09, pp.1245-1254, 2009. ,
DOI : 10.1145/1557019.1557153
Studying users' computer security behavior: A health belief perspective, Decision Support Systems, vol.46, issue.4, pp.815-825, 2009. ,
DOI : 10.1016/j.dss.2008.11.010
Phishing Attacks and Countermeasures, Handbook of Information and Communication Security, pp.433-448, 2010. ,
DOI : 10.1007/978-3-642-04117-4_23
Knowledge retention in computer-based training, 2001. ,
Entwickeln einer Awareness-Kampagne für einen sicheren Umgang mit dem Internet an mittelgrossen Berufs-oder Maturitätsschulen, 2010. ,
Who falls for phish?, Proceedings of the 28th international conference on Human factors in computing systems, CHI '10, pp.373-382, 2010. ,
DOI : 10.1145/1753326.1753383
Anti-Phishing Phil, Proceedings of the 3rd symposium on Usable privacy and security, SOUPS '07, pp.88-99, 2007. ,
DOI : 10.1145/1280680.1280692
The fundamentals of learning, 1932. ,
DOI : 10.1037/10976-000