“…In the second part, we analyze publications studying the training materials themselves (e.g., how the documents should be structured or whether more graphics should be used than text). [50,96], trust symbols [111,120,129], spelling [130], links [130], content consistency [130], personalization [130], visual appearance [95,119,130], urgency [130], social presence [87] Spelling errors [84], link destination [127] Topic Shipping [50], order [50], received fax [50], complaint [50], banks [136], government institutions [136] Other gain [55], other loss [55], individual gain [55], individual loss [55] Link URL Categories 5, 6 [128], same protocol [79], contains secure or similar terms [128] Categories 1, 2, 7 [128] Design Clone of original [79,124] -Survey a. Form of the training: Based on their results, Kumaraguru et al [82] suggest that users learn more effectively when the training materials are presented after the users have fallen victim to a simulated attack.…”