Evaluation-of-the-Model-for-Analysing-Anti-Phishing-Authentication-Ceremonies