Jampen, D., G
¨
ur, G., Sutter, T., and Tellenbach, B. (2020).
Don’t click: towards an effective anti-phishing train-
ing. A comparative literature review. Human-centric
Computing and Information Sciences, 10(1):33.
Khan, B., Khaled, S. A., Syed, I. N., and Muhammad,
K. K. (2011). Effectiveness of information security
awareness methods based on psychological theories.
African journal of business management, 5(26).
K
¨
ohler, D., P
¨
unter, W., and Meinel, C. (2023). Fishing
for Non-Professional Answers: Quantitative Study on
Email Phishing Susceptibility in Private Contexts. In
Review.
Kruger, H. A. and Kearney, W. D. (2006). A prototype for
assessing information security awareness. Computers
& security, 25(4):289–296.
Kumaraguru, P., Cranshaw, J., Acquisti, A., Cranor, L.,
Hong, J., Blair, M. A., and Pham, T. (2009). School of
phish: a real-world evaluation of anti-phishing train-
ing. In Proceedings of the 5th Symposium on Usable
Privacy and Security. ACM.
K
¨
ohler, D. (2023). Discussion on Methods for Assessing
Cybersecurity Awareness. Workshop Presentation.
K
¨
ohler, D., P
¨
unter, W., and Meinel, C. (2023). The “How”
Matters: Evaluating Different Video Types for Cyber-
security MOOCs. In Responsive and Sustainable Edu-
cational Futures, Lecture Notes in Computer Science,
pages 149–163, Cham. Springer Nature Switzerland.
K
¨
ohler, D., Serth, S., Steinbeck, H., and Meinel, C. (2022).
Integrating Podcasts into MOOCs: Comparing Effects
of Audio- and Video-Based Education for Secondary
Content. In Educating for a New Future: Making
Sense of Technology-Enhanced Learning Adoption,
volume 13450 of LNCS, pages 131–144. Springer In-
ternational Publishing, Switzerland.
Lain, D., Kostiainen, K., and
ˇ
Capkun, S. (2022). Phishing in
organizations: Findings from a large-scale and long-
term study. In 2022 IEEE Symposium on Security and
Privacy (SP), pages 842–859. IEEE.
Lutz, W. and Kc, S. (2011). Global Human Capi-
tal: Integrating Education and Population. Science,
333(6042).
Maennel, K., M
¨
ases, S., and Maennel, O. (2018). Cyber
Hygiene: The Big Picture. In Secure IT Systems,
Lecture Notes in Computer Science, pages 291–305,
Cham. Springer International Publishing.
Marks, A. and Rezgui, Y. (2009). A Comparative Study of
Information Security Awareness in Higher Education
Based on the Concept of Design Theorizing. In 2009
International Conference on Management and Service
Science, pages 1–7.
Mavrodieva, A. V., Rachman, O. K., Harahap, V. B., and
Shaw, R. (2019). Role of social media as a soft power
tool in raising public awareness and engagement in ad-
dressing climate change. Climate, 7(10):122. ISBN:
2225-1154 Publisher: MDPI.
Nagelhout, G. E., Van Den Putte, B., De Vries, H., Crone,
M., Fong, G. T., and Willemsen, M. C. (2012). The in-
fluence of newspaper coverage and a media campaign
on smokers’ support for smoke-free bars and restau-
rants and on secondhand smoke harm awareness:. To-
bacco Control, 21.
Orunsolu, A. A., Sodiya, A. S., Akinwale, A. T., Olaju-
won, B. I., Alaran, M. A., Bamgboye, O. O., and Afo-
labi, O. A. (2017). An empirical evaluation of security
tips in phishing prevention: A case study of nigerian
banks. International Journal of Electronics and Infor-
mation Engineering, 6(1):25–39.
O’Shea, P. and Richmond, S. (2007). Radio Education: A
Review of the Literature. Publisher: World Ag Info
Project.
Putte, B. v. d. (2009). What matters most in advertising
campaigns?: The relative effect of media expenditure
and message content strategy. International Journal
of Advertising, 28(4):669–690.
Rahim, N. H. A., Hamid, S., Mat Kiah, M. L., Shamshir-
band, S., and Furnell, S. (2015). A systematic review
of approaches to assessing cybersecurity awareness.
Kybernetes, 44(4):606–622.
Scholl, M., Leiner, K. B., and Fuhrmann, F. (2017). Blind
Spot: Do You Know the Effectiveness of Your Infor-
mation Security Awareness-Raising Program? 15(4).
Sch
¨
utz, A. E. (2018). Information security awareness: it’s
time to change minds. In Proceedings of International
Conference on Applied Informatics Imagination, Cre-
ativity, Design, Development-ICDD.
Wolf, M. J., Haworth, D., and Pietron, L. (2010). Measuring
an information security awareness program. Univer-
sity of Nebraska at Omaha.
Yıldırım, M. and Mackie, I. (2019). Encouraging users to
improve password security and memorability. Inter-
national Journal of Information Security, 18(6).
Zhang-Kennedy, L. and Chiasson, S. (2021). A sys-
tematic review of multimedia tools for cybersecurity
awareness and education. ACM Computing Surveys
(CSUR), 54(1):1–39.
Zhang-Kennedy, L. and Chiasson, S. (2022). A System-
atic Review of Multimedia Tools for Cybersecurity
Awareness and Education. ACM Computing Surveys,
54(1):1–39.
Zielinska, O. A., Tembe, R., Hong, K. W., Ge, X., Murphy-
Hill, E., and Mayhorn, C. B. (2014). One Phish, Two
Phish, How to Avoid the Internet Phish: Analysis of
Training Strategies to Detect Phishing Emails. Pro-
ceedings of the Human Factors and Ergonomics So-
ciety Annual Meeting, 58. Publisher: SAGE Publica-
tions.
The Right Tool for the Job: Contextualization of Cybersecurity Education and Assessment Methods
241