{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T17:30:00Z","timestamp":1769880600395,"version":"3.49.0"},"reference-count":156,"publisher":"Informa UK Limited","issue":"18","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Human\u2013Computer Interaction"],"published-print":{"date-parts":[[2025,9,17]]},"DOI":"10.1080\/10447318.2024.2444046","type":"journal-article","created":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:25:52Z","timestamp":1736486752000},"page":"11722-11742","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":4,"title":["\u201cIt\u2019s Definitely New and Different\u2026It\u2019s Really Engaging\u201d: Understanding the Power of Storytelling Towards Secure Password Creation"],"prefix":"10.1080","volume":"41","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3840-9015","authenticated-orcid":false,"given":"Rizu","family":"Paudel","sequence":"first","affiliation":[{"name":"Department of Computer Science, Utah State University","place":["Logan, USA"]}]},{"given":"Mahdi Nasrullah","family":"Al-Ameen","sequence":"additional","affiliation":[{"name":"Department of Computer Science, Utah State University","place":["Logan, USA"]}]}],"member":"301","published-online":{"date-parts":[[2025,1,10]]},"reference":[{"key":"e_1_3_3_2_1","volume-title":"Bainbridge, W. Encyclopedia of Human-Computer Interaction","author":"Abras C.","year":"2004","unstructured":"Abras, C., Maloney-Krichmar, D., Preece, J., et\u00a0al. (2004). User-centered design. In Bainbridge, W. Encyclopedia of Human-Computer Interaction. Sage Publications."},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-3601-9_1"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3138073"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tjem.2018.08.001"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2021-0067"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2020.1858161"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702241"},{"issue":"9","key":"e_1_3_3_9_1","first-page":"126","article-title":"Integrate digital storytelling in education","volume":"6","author":"Alismail H. A.","year":"2015","unstructured":"Alismail, H. A. (2015). Integrate digital storytelling in education. Journal of Education and Practice, 6(9), 126\u2013129.","journal-title":"Journal of Education and Practice,"},{"key":"e_1_3_3_10_1","unstructured":"Amador J. Ma Y. Hasama S. Lumba E. Lee G. & Birrell E. (2023). Prospects for improving password selection [Paper presentation]. Nineteenth Symposium on Usable Privacy and Security (Soups 2023) (pp. 263\u2013282)."},{"key":"e_1_3_3_11_1","unstructured":"Amft S. H\u00f6ltervennhoff S. Huaman N. Acar Y. & Fahl S. (2023). \u201cwould you give the same priority to the bank and a game? i do {not!}\u201d exploring credential management strategies and obstacles during password manager setup [Paper presentation]. Nineteenth Symposium on Usable Privacy and Security (Soups 2023) (pp. 171\u2013190)."},{"key":"e_1_3_3_12_1","volume-title":"Using instructional design strategies to foster curiosity","author":"Arnone M. P.","year":"2003","unstructured":"Arnone, M. P. (2003). Using instructional design strategies to foster curiosity. ERIC Clearinghouse on Information and Technology."},{"key":"e_1_3_3_13_1","unstructured":"Authentication A. C. Conners J. & Zappala D. (n.d.). Let\u2019s authenticate. https:\/\/par.nsf.gov\/servlets\/purl\/10422831"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/11550617_26"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/C2013-0-13611-2"},{"key":"e_1_3_3_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-02217-3"},{"key":"e_1_3_3_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.49"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.44"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34638-5_1"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1177\/0017896917745568"},{"key":"e_1_3_3_21_1","volume-title":"Transforming qualitative information: Thematic analysis and code development","author":"Boyatzis R. E.","year":"1998","unstructured":"Boyatzis, R. E. (1998). Transforming qualitative information: Thematic analysis and code development. Sage."},{"key":"e_1_3_3_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00154696"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1191\/1478088706qp063oa"},{"key":"e_1_3_3_24_1","doi-asserted-by":"publisher","DOI":"10.1080\/14780887.2020.1769238"},{"key":"e_1_3_3_25_1","unstructured":"Brinks M. (2019). Ethos pathos logos kairos: The modes of persuasion and how to use them. Prep Scholar Retrieved on August 20 2021. https:\/\/blog.prepscholar.com\/ethos-pathos-logos-kairos-modes-of-persuasion"},{"key":"e_1_3_3_26_1","volume-title":"Acts of meaning: Four lectures on mind and culture","author":"Bruner J.","year":"1990","unstructured":"Bruner, J. (1990). Acts of meaning: Four lectures on mind and culture (Vol. 3). Harvard university press."},{"issue":"2","key":"e_1_3_3_27_1","first-page":"12","article-title":"Using storytelling to improve cybersecurity awareness: A framework for engagement","volume":"15","author":"Bruny C.","year":"2021","unstructured":"Bruny, C., & Smith, D. (2021). Using storytelling to improve cybersecurity awareness: A framework for engagement. Cyberpsychology: Journal of Psychosocial Research on Cyberspace, 15(2), 12.","journal-title":"Cyberpsychology: Journal of Psychosocial Research on Cyberspace,"},{"key":"e_1_3_3_28_1","doi-asserted-by":"publisher","DOI":"10.6028\/NIST.SP.XXX"},{"key":"e_1_3_3_29_1","unstructured":"Cameron D. (2014). Apple knew of icloud security hole 6 months before celebgate. The Daily Dot. http:\/\/www.dailydot.com\/technology\/apple-icloud-brute-force-attack-march\/"},{"key":"e_1_3_3_30_1","doi-asserted-by":"publisher","DOI":"10.1093\/obo\/9780195389678-0273"},{"key":"e_1_3_3_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1280680.1280682"},{"key":"e_1_3_3_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531514.1531531"},{"key":"e_1_3_3_33_1","unstructured":"Cila N. (2013). Metaphors we design by: The use of metaphors in product design. https:\/\/www.nazlicila.com\/projects\/metaphors-we-design-by"},{"key":"e_1_3_3_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-57186-7_41"},{"key":"e_1_3_3_35_1","doi-asserted-by":"publisher","DOI":"10.4324\/9780203771587"},{"key":"e_1_3_3_36_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9280.1992.tb00250.x"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.2752\/146069203789355480"},{"key":"e_1_3_3_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/1536867X1501500117"},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sbspro.2015.07.062"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3607019"},{"key":"e_1_3_3_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613905.3651113"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1108\/ICS-04-2023-0047"},{"key":"e_1_3_3_43_1","first-page":"10","volume-title":"Proceedings of the International Conference on Cloud Security Management (Iccsm \u201813)","author":"Dupuis M.","year":"2013","unstructured":"Dupuis, M., Endicott-Popovsky, B., & Crossler, R. (2013). An analysis of the use of amazon\u2019s mechanical turk for survey research in the cloud [Paper presentation]. In Proceedings of the International Conference on Cloud Security Management (Iccsm \u201813), (p. 10."},{"key":"e_1_3_3_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2481329"},{"key":"e_1_3_3_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2501604.2501617"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445164"},{"key":"e_1_3_3_47_1","doi-asserted-by":"publisher","DOI":"10.1093\/0199253048.001.0001"},{"key":"e_1_3_3_48_1","doi-asserted-by":"publisher","DOI":"10.1080\/15546128.2013.838504"},{"key":"e_1_3_3_49_1","unstructured":"Habib H. Naeini P. E. Devlin S. Oates M. Swoopes C. Bauer L. & Cranor L. F. (2018). User behaviors and attitudes under password expiration policies [Paper presentation]. Fourteenth Symposium on Usable Privacy and Security (Soups) (pp. 13\u201330)."},{"key":"e_1_3_3_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979232"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1719030.1719050"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2011.150"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03549-4_14"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557165"},{"key":"e_1_3_3_55_1","doi-asserted-by":"publisher","DOI":"10.1108\/02756661011036673"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1111\/dial.12084"},{"key":"e_1_3_3_57_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.accfor.2012.02.003"},{"key":"e_1_3_3_58_1","doi-asserted-by":"publisher","DOI":"10.2752\/175630612X13192035508462"},{"key":"e_1_3_3_59_1","unstructured":"Hunt T. (2011). The science of password selection. Blog Post. https:\/\/www.troyhunt.com\/science-of-password-selection\/"},{"key":"e_1_3_3_60_1","unstructured":"Imperva A. (2010). Consumer password worst practices. Application Defense Center. https:\/\/carrero.es\/wp-content\/uploads\/2010\/02\/WP_Consumer_Password_Worst_Practices.pdf"},{"key":"e_1_3_3_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753326.1753384"},{"key":"e_1_3_3_62_1","unstructured":"Ion I. Reeder R. & Consolvo S. (2015). \u201cno one can hack my mind\u201d: Comparing expert and non-expert security practices [Paper presentation]. Eleventh Symposium on Usable Privacy and Security (Soups) (pp. 327\u2013346)."},{"key":"e_1_3_3_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869086.1869094"},{"key":"e_1_3_3_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4614-4878-5_2"},{"key":"e_1_3_3_65_1","unstructured":"Kang R. Brown S. Dabbish L. & Kielser S. B. (2014). Privacy attitudes of mechanical turk workers and the us public [Paper presentation]. Proceedings of the Tenth Symposium on Usable Privacy and Security (Soups \u201814) (pp. 37\u201349)."},{"key":"e_1_3_3_66_1","unstructured":"Kapelner A. & Chandler D. (2010). Preventing satisficing in online surveys [Paper presentation]. Proceedings of Crowd conference."},{"key":"e_1_3_3_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3003733.3003764"},{"key":"e_1_3_3_68_1","unstructured":"Kelley P. G. (2010). Conducting usable privacy & security studies with amazon\u2019s mechanical turk [Paper presentation]. Proceedings of the Fifth Symposium on Usable Privacy and Security (Soups \u201810)."},{"key":"e_1_3_3_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2012.38"},{"key":"e_1_3_3_70_1","unstructured":"Komanduri S. Shay R. Cranor L. F. Herley C. & Schechter S. (2014). Telepathwords: Preventing weak passwords by reading users\u2019 minds [Paper presentation]. 23rd Usenix Security Symposium (pp. 591\u2013606)."},{"key":"e_1_3_3_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978942.1979321"},{"issue":"5","key":"e_1_3_3_72_1","first-page":"107","article-title":"Password in practice: An usability survey","volume":"2","author":"Kumar N.","year":"2011","unstructured":"Kumar, N. (2011). Password in practice: An usability survey. Journal of Global Research in Computer Science, 2(5), 107\u2013112.","journal-title":"Journal of Global Research in Computer Science,"},{"key":"e_1_3_3_73_1","doi-asserted-by":"publisher","DOI":"10.1111\/apps.12108"},{"key":"e_1_3_3_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1143120.1143129"},{"key":"e_1_3_3_75_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15516709cog0402_4"},{"key":"e_1_3_3_76_1","doi-asserted-by":"publisher","DOI":"10.2307\/414069"},{"key":"e_1_3_3_77_1","unstructured":"Lee K. Sj\u00f6berg S. & Narayanan A. (2022). Password policies of most top websites fail to follow best practices [Paper presentation]. Eighteenth Symposium on Usable Privacy and Security (Soups 2022) (pp. 561\u2013580)."},{"key":"e_1_3_3_78_1","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780195328318.003.0009"},{"key":"e_1_3_3_79_1","unstructured":"Love D. (2014). Apple on icloud breach: It\u2019s not our fault hackers guessed celebrity passwords. International Business Times. http:\/\/www.ibtimes.com\/apple-icloud-breach-its-not-our-fault-hackers-guessed-celebrity-passwords-1676268"},{"key":"e_1_3_3_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP40000.2020.00047"},{"key":"e_1_3_3_81_1","volume-title":"Narrative therapy","author":"Madigan S.","year":"2011","unstructured":"Madigan, S. (2011). Narrative therapy. American Psychological Association."},{"key":"e_1_3_3_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2187836.2187878"},{"key":"e_1_3_3_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/505103.505107"},{"key":"e_1_3_3_84_1","doi-asserted-by":"publisher","DOI":"10.1080\/01972243.2021.1951415"},{"key":"e_1_3_3_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516726"},{"key":"e_1_3_3_86_1","doi-asserted-by":"publisher","DOI":"10.46743\/2160-3715\/2019.3713"},{"issue":"1","key":"e_1_3_3_87_1","first-page":"17","article-title":"Corporate storytelling perspectives","volume":"29","author":"McLellan H.","year":"2006","unstructured":"McLellan, H. (2006a). Corporate storytelling perspectives. The Journal for Quality and Participation, 29(1), 17.","journal-title":"The Journal for Quality and Participation,"},{"issue":"5","key":"e_1_3_3_88_1","first-page":"26","article-title":"Digital storytelling: Bridging old and new","volume":"46","author":"McLellan H.","year":"2006","unstructured":"McLellan, H. (2006b). Digital storytelling: Bridging old and new. Educational Technology, 46(5), 26\u201331.","journal-title":"Educational Technology,"},{"key":"e_1_3_3_89_1","unstructured":"McMillan R. (2012). The world\u2019s first computer password? it was useless too. Wired Magazine."},{"key":"e_1_3_3_90_1","doi-asserted-by":"publisher","DOI":"10.4018\/jhisi.2007070104"},{"key":"e_1_3_3_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/2282338.2282364"},{"key":"e_1_3_3_92_1","unstructured":"Monteiro J. M. M. (2022). Storytelling and minecraft in education: Creating a world and measuring its impact on the learning process. https:\/\/hdl.handle.net\/10216\/142898"},{"key":"e_1_3_3_93_1","doi-asserted-by":"publisher","DOI":"10.3390\/bs9120147"},{"key":"e_1_3_3_94_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11606-017-4246-0"},{"key":"e_1_3_3_95_1","doi-asserted-by":"publisher","DOI":"10.3390\/ejihpe10040069"},{"key":"e_1_3_3_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.241424"},{"key":"e_1_3_3_97_1","unstructured":"Nisenoff A. Golla M. Wei M. Hainline J. Szymanek H. Braun A. & Ur B. (2023). A {Two-Decade} retrospective analysis of a university\u2019s vulnerability to attacks exploiting reused passwords [Paper presentation]. 32nd Usenix Security Symposium (Usenix Security 23) (pp. 5127\u20135144)."},{"key":"e_1_3_3_98_1","unstructured":"Norman D. A. (2005). Emotional design: People and things. Retrieved February 1."},{"key":"e_1_3_3_99_1","doi-asserted-by":"publisher","DOI":"10.4135\/9781452277479"},{"key":"e_1_3_3_100_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jesp.2009.03.009"},{"key":"e_1_3_3_101_1","doi-asserted-by":"publisher","DOI":"10.4324\/9781315785233"},{"key":"e_1_3_3_102_1","doi-asserted-by":"publisher","DOI":"10.1017\/S1930297500002205"},{"key":"e_1_3_3_103_1","doi-asserted-by":"publisher","DOI":"10.1145\/3678884.3681888"},{"key":"e_1_3_3_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3687043"},{"key":"e_1_3_3_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3637387"},{"key":"e_1_3_3_106_1","doi-asserted-by":"publisher","DOI":"10.1145\/3579595"},{"key":"e_1_3_3_107_1","doi-asserted-by":"publisher","DOI":"10.3758\/s13428-013-0434-y"},{"key":"e_1_3_3_108_1","doi-asserted-by":"publisher","DOI":"10.1006\/brcg.1995.1032"},{"key":"e_1_3_3_109_1","doi-asserted-by":"publisher","DOI":"10.3390\/su13031193"},{"key":"e_1_3_3_110_1","doi-asserted-by":"publisher","DOI":"10.1093\/poq\/nfh008"},{"key":"e_1_3_3_111_1","doi-asserted-by":"publisher","DOI":"10.3758\/BF03195438"},{"key":"e_1_3_3_112_1","doi-asserted-by":"publisher","DOI":"10.1145\/2078827.2078829"},{"key":"e_1_3_3_113_1","unstructured":"Redmiles E. M. Acar Y. Fahl S. & Mazurek M. L. (2017). A summary of survey methodology best practices for security and privacy researchers (Technical Report)."},{"key":"e_1_3_3_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2019.00014"},{"key":"e_1_3_3_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3411764.3445465"},{"key":"e_1_3_3_116_1","doi-asserted-by":"publisher","DOI":"10.1080\/00405840802153916"},{"key":"e_1_3_3_117_1","first-page":"37","article-title":"What educators should know about teaching digital storytelling","volume":"22","author":"Robin B. R.","year":"2012","unstructured":"Robin, B. R., & McNeil, S. G. (2012). What educators should know about teaching digital storytelling. Digital Education Review, 22, 37\u201351.","journal-title":"Digital Education Review,"},{"key":"e_1_3_3_118_1","first-page":"1","volume-title":"2019 IEEE Frontiers in Education Conference (Fie)","author":"Rocha T. S.","year":"2019","unstructured":"Rocha, T. S., & de Albuquerque, A. B. (2019). Educational approaches for teaching cyber-security: A systematic mapping study [Paper presentation]. 2019 IEEE Frontiers in Education Conference (Fie), (pp. 1\u20138). IEEE."},{"key":"e_1_3_3_119_1","doi-asserted-by":"publisher","DOI":"10.1145\/3530190.3534810"},{"key":"e_1_3_3_120_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tsc.2018.02.002"},{"key":"e_1_3_3_121_1","doi-asserted-by":"publisher","DOI":"10.1213\/ane.0000000000002864"},{"key":"e_1_3_3_122_1","unstructured":"Schrepp M. & Thomaschewski J. (2019). Handbook for the modular extension of the user experience questionnaire. Mensch & Computer (pp. 1\u201319)."},{"key":"e_1_3_3_123_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363270"},{"key":"e_1_3_3_124_1","doi-asserted-by":"publisher","DOI":"10.1145\/2702123.2702586"},{"key":"e_1_3_3_125_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556288.2557377"},{"key":"e_1_3_3_126_1","doi-asserted-by":"publisher","DOI":"10.1145\/2891411"},{"key":"e_1_3_3_127_1","doi-asserted-by":"publisher","DOI":"10.1145\/1837110.1837113"},{"key":"e_1_3_3_128_1","doi-asserted-by":"publisher","DOI":"10.1145\/3584931.3607002"},{"key":"e_1_3_3_129_1","doi-asserted-by":"publisher","DOI":"10.1145\/3613904.3642301"},{"key":"e_1_3_3_130_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555763"},{"key":"e_1_3_3_131_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1361-3723(17)30007-6"},{"key":"e_1_3_3_132_1","doi-asserted-by":"publisher","DOI":"10.5040\/9798216027911"},{"key":"e_1_3_3_133_1","unstructured":"Sotirakopoulos A. Muslukov I. Beznosov K. Herley C. & Egelman S. (2011). Poster: Motivating users to choose better passwords through peer pressure [Paper presentation]. Proceedings SOUPS 2011."},{"key":"e_1_3_3_134_1","unstructured":"Specops (2023). Weak password report 2023. https:\/\/specopssoft.com\/wp-content\/uploads\/2023\/03\/Specops-Software-Weak-Password-report-2023.pdf"},{"issue":"2","key":"e_1_3_3_135_1","first-page":"163","article-title":"The methodology of participatory design","volume":"52","author":"Spinuzzi C.","year":"2005","unstructured":"Spinuzzi, C. (2005). The methodology of participatory design. Technical Communication, 52(2), 163\u2013174.","journal-title":"Technical Communication,"},{"key":"e_1_3_3_136_1","doi-asserted-by":"publisher","DOI":"10.1080\/01611190701743724"},{"key":"e_1_3_3_137_1","unstructured":"Stacy C. Johnson W. L. & Catherine M. L. (2003). Interactive pedagogical drama for health interventions [Paper presentation]. 11th International Conference in Artificial Intelligence in Education Aied Australia."},{"key":"e_1_3_3_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/3555132"},{"key":"e_1_3_3_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372297.3417882"},{"key":"e_1_3_3_140_1","doi-asserted-by":"publisher","DOI":"10.3390\/info9030065"},{"key":"e_1_3_3_141_1","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3026050"},{"key":"e_1_3_3_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/2858036.2858546"},{"key":"e_1_3_3_143_1","unstructured":"Ur B. Kelley P. G. Komanduri S. Lee J. Maass M. Mazurek M. L. & Cranor L. F. (2012). How does your password measure up? the effect of strength meters on password creation [Paper presentation]. Proceedings of the 21st usenix conference on security symposium (p. 5). USENIX Association."},{"key":"e_1_3_3_144_1","unstructured":"Ur B. Komanduri S. Shay R. Matsumoto S. Bauer L. Christin N. & Vidas T. (2013). Poster: The art of password creation [Paper presentation]. Proceedings of the IEEE Symposium on Security and Privacy 6."},{"key":"e_1_3_3_145_1","unstructured":"Ur B. Noma F. Bees J. Segreti S. M. Shay R. Bauer L. & Cranor L. F. (2015). \u201c i added\u2019 !\u2019at the end to make it secure\u201d: Observing password creation in the lab [Paper presentation]. Eleventh symposium on usable privacy and security (soups 2015) (pp. 123\u2013140)."},{"key":"e_1_3_3_146_1","unstructured":"Van Gils F. (2005). Potential applications of digital storytelling in education [Paper presentation]. 3rd Twente Student Conference on It 7. https:\/\/api.semanticscholar.org\/CorpusID:1962"},{"key":"e_1_3_3_147_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2014.23103"},{"key":"e_1_3_3_148_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"e_1_3_3_149_1","doi-asserted-by":"publisher","DOI":"10.1145\/2379690.2379702"},{"key":"e_1_3_3_150_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40477-1_28"},{"key":"e_1_3_3_151_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2007.03.007"},{"key":"e_1_3_3_152_1","unstructured":"Wang D. Shan X. Dong Q. Shen Y. & Jia C. (2023). No single silver bullet: Measuring the accuracy of password strength meters [Paper presentation]. 32nd Usenix Security Symposium (USENIX Security 23) (pp. 947\u2013964)."},{"key":"e_1_3_3_153_1","doi-asserted-by":"publisher","DOI":"10.3390\/su11195264"},{"key":"e_1_3_3_154_1","unstructured":"Xu M. Yu J. Zhang X. Wang C. Zhang S. Wu H. & Han W. (2023). Improving real-world password guessing attacks via bi-directional transformers [Paper presentation]. 32nd Usenix Security Symposium (USENIX Security 23) (pp. 1001\u20131018)."},{"key":"e_1_3_3_155_1","doi-asserted-by":"publisher","DOI":"10.1109\/eCRS.2013.6805770"},{"key":"e_1_3_3_156_1","unstructured":"Zibaei S. Salehi-Abari A. & Thorpe J. (2023). Dissecting nudges in password managers: Simple defaults are powerful [Paper presentation]. Nineteenth Symposium on Usable Privacy and Security (Soups 2023) (pp. 211\u2013225)."},{"key":"e_1_3_3_157_1","doi-asserted-by":"publisher","DOI":"10.1080\/0144929X.2022.2042384"}],"container-title":["International Journal of Human\u2013Computer Interaction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/10447318.2024.2444046","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,5]],"date-time":"2025-09-05T10:08:54Z","timestamp":1757066934000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/10447318.2024.2444046"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,1,10]]},"references-count":156,"journal-issue":{"issue":"18","published-print":{"date-parts":[[2025,9,17]]}},"alternative-id":["10.1080\/10447318.2024.2444046"],"URL":"https:\/\/doi.org\/10.1080\/10447318.2024.2444046","relation":{},"ISSN":["1044-7318","1532-7590"],"issn-type":[{"value":"1044-7318","type":"print"},{"value":"1532-7590","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,1,10]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=hihc20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2023-11-21","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-11-30","order":1,"name":"revised","label":"Revised","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-12-12","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2025-01-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}