{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T17:32:09Z","timestamp":1776101529308,"version":"3.50.1"},"reference-count":73,"publisher":"Oxford University Press (OUP)","issue":"1","license":[{"start":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T00:00:00Z","timestamp":1712880000000},"content-version":"vor","delay-in-days":102,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n               <jats:p>The timeless nature of fairy tales can help uncover the timeless nature of many cybersecurity notions. Using 16 classical tales as illustration, in this article, the author shows that fairy tales are full of cybersecurity motifs and examples, and can thus be used extensively and effectively to explain cybersecurity notions. Obviously not cybersecurity as we know it today, but rather the fundamental and archetypal concepts that are at its heart. Fairy tales can thus be employed to mediate in conversations with less-knowledgeable, misinformed, or even skeptical laypersons about cybersecurity, increase their understanding and awareness, and thereby strengthen the overall cybersecurity of systems and applications.<\/jats:p>","DOI":"10.1093\/cybsec\/tyae005","type":"journal-article","created":{"date-parts":[[2024,4,12]],"date-time":"2024-04-12T09:19:50Z","timestamp":1712913590000},"source":"Crossref","is-referenced-by-count":3,"title":["The cybersecurity of fairy tales"],"prefix":"10.1093","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9916-271X","authenticated-orcid":false,"given":"Luca","family":"Vigan\u00f2","sequence":"first","affiliation":[{"name":"Department of Informatics, King\u2019s College London , Bush House, 30 Aldwych, WC2B 4BG London,","place":["United Kingdom"]}]}],"member":"286","published-online":{"date-parts":[[2024,4,12]]},"reference":[{"key":"2024121909122245200_bib1","doi-asserted-by":"crossref","DOI":"10.1093\/owc\/9780199585809.001.0001","volume-title":"The Complete Fairy Tales","author":"Perrault","year":"2010"},{"key":"2024121909122245200_bib2","volume-title":"Kinder- und Hausm\u00e4rchen","author":"Grimm","year":"1812"},{"key":"2024121909122245200_bib3","volume-title":"Puss in Boots \u2014 And Other Very Clever Cats, Origins of Fairy Tales from Around the World","author":"Carruthers","year":"2015"},{"key":"2024121909122245200_bib4","volume-title":"Les mille et une nuits \u2014 \u00c9dition illustr\u00e9e","author":"Galland","year":"2021"},{"key":"2024121909122245200_bib5","volume-title":"Nights with Uncle Remus. Myths and Legends of the Old Plantation","author":"Harris","year":"1883"},{"key":"2024121909122245200_bib6","volume-title":"The Complete Hans Christian Andersen Fairy Tales","author":"Andersen","year":"1993"},{"key":"2024121909122245200_bib7","volume-title":"The Interpretation of Fairy Tales","author":"von\u00a0Franz","year":"2017"},{"key":"2024121909122245200_bib8","article-title":"Computer Security Resource Center of the National Institute of Standards and Technology of the U.S. Department of Commerce (NIST). Glossary of terms and definitions"},{"key":"2024121909122245200_bib9","volume-title":"Threat Modeling: Designing for Security","author":"Shostack","year":"2014"},{"key":"2024121909122245200_bib10","article-title":"Minority Report","author":"Steven Spielberg (directed by). Screenplay by Scott Frank and Jon Cohen based upon a short story by Philip K. Dick","year":"2002"},{"key":"2024121909122245200_bib11","article-title":"National Treasure","author":"Jon Turteltaub (directed by) Screenplay by Jim Kouf, Cormac Wibberley and Marianne Wibberley","year":"2004"},{"key":"2024121909122245200_bib12","volume-title":"Cinderella \u2014 And Other Girls Who Lost Their Slippers, Origins of Fairy Tales from Around the World","author":"Carruthers","year":"2015"},{"key":"2024121909122245200_bib13","volume-title":"Cinderella \u2014 Three hundred and forty-five variants of Cinderella, Catskin, and Cap o\u2019Rushes, abstracted and tabulated, with a discussion of medi\u00e6val analogues, and notes","author":"Cox","year":"1893"},{"key":"2024121909122245200_bib14","volume-title":"The Cinderella Story","author":"Philip","year":"1989"},{"key":"2024121909122245200_bib15","doi-asserted-by":"crossref","DOI":"10.1037\/e309842005-008","volume-title":"The Uses of Enchantment: The Meaning and Importance of Fairy Tales","author":"Bettelheim","year":"1976"},{"key":"2024121909122245200_bib16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-91101-4","volume-title":"Fashion in the Fairy Tale Tradition (What Cinderella Wore)","author":"Do\u00a0Rozario","year":"2018"},{"key":"2024121909122245200_bib17","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-030-42653-8_18","article-title":"Explaining cybersecurity with films and the arts","volume-title":"Imagine Math 7","author":"Vigan\u00f2","year":"2020"},{"key":"2024121909122245200_bib18","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-030-92690-8_30","article-title":"Don\u2019t tell me the cybersecurity moon is shining... (cybersecurity show and tell)","volume-title":"Imagine Math 8","author":"Vigan\u00f2","year":"2022"},{"key":"2024121909122245200_bib19","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1007\/978-3-030-85623-6_3","article-title":"Nicolas Cage is the center of the cybersecurity universe","volume-title":"Human-Computer Interaction \u2014 INTERACT 2021. vol. 12932 of Lecture Notes in Computer Science","author":"Vigan\u00f2","year":"2021"},{"key":"2024121909122245200_bib20","first-page":"293","article-title":"Explainable security","volume-title":"Proceedings of the IEEE European Symposium on Security and Privacy Workshops, EuroS&P Workshops 2020, Genoa, Italy, September 7-11, 2020","author":"Vigan\u00f2","year":"2020"},{"key":"2024121909122245200_bib21","first-page":"102","article-title":"The power of the arts","volume":"30","author":"Marlow","year":"2017","journal-title":"The Psychol"},{"key":"2024121909122245200_bib22","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1080\/00098655.2012.674984","article-title":"The art of teaching social studies with film","volume":"85","author":"Russell","year":"2012","journal-title":"Clear House J Educ Strat Iss Ideas"},{"key":"2024121909122245200_bib23","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1080\/15512169.2013.747840","article-title":"Teaching introduction to international politics with film","volume":"9","author":"Valeriano","year":"2013","journal-title":"J Polit Sci Educ"},{"key":"2024121909122245200_bib24","volume-title":"Management: Using Film to Visualize Principles and Practice","author":"Champoux","year":"2000"},{"key":"2024121909122245200_bib25","doi-asserted-by":"crossref","DOI":"10.4159\/9780674029019","volume-title":"Actual Minds, Possible Worlds","author":"Bruner","year":"1986"},{"key":"2024121909122245200_bib26","doi-asserted-by":"crossref","first-page":"3","DOI":"10.7330\/9781607324812.c000","article-title":"Introduction: cross-disciplinary perspectives on teaching folklore and fairy tales in higher education","volume-title":"New Approaches to Teaching Folk and Fairy Tales","author":"Jones","year":"2016"},{"key":"2024121909122245200_bib27","doi-asserted-by":"crossref","first-page":"102","DOI":"10.13110\/marvelstales.33.1.0102","article-title":"Teaching with stories: empathy, relatability, and the fairy tale","volume":"33","author":"Cleto","year":"2019","journal-title":"Marvels and Tales"},{"key":"2024121909122245200_bib28","article-title":"Why we need fairy tales","author":"Packer","year":"2023"},{"key":"2024121909122245200_bib29","volume-title":"Nursery Rhymes and Tales. Their Origin and History","author":"Bett","year":"1924"},{"key":"2024121909122245200_bib30","volume-title":"Slang: To-Day and Yesterday","author":"Partridge","year":"1933"},{"key":"2024121909122245200_bib31","volume-title":"A Dictionary of Historical Slang","author":"Partridge","year":"1972"},{"key":"2024121909122245200_bib32","volume-title":"The Oxford Dictionary of Rhyming Slang","author":"Ayto","year":"2003"},{"key":"2024121909122245200_bib33","volume-title":"The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography","author":"Singh","year":"1999"},{"key":"2024121909122245200_bib34","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-319-90443-6","volume-title":"History of Cryptography and Cryptanalysis: Codes, Ciphers, and Their Algorithms","author":"Dooley","year":"2018"},{"key":"2024121909122245200_bib35","first-page":"628","article-title":"How to explain zero-knowledge protocols to your children","volume-title":"CRYPTO\u201989. LNCS 435","author":"Quisquater","year":"1989"},{"key":"2024121909122245200_bib36","article-title":"A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management (Version v0.34)","author":"Pfitzmann","year":"2010"},{"key":"2024121909122245200_bib37","volume-title":"The Types of International Folktales: A Classification and Bibliography. Based on the system of Antti Aarne and Stith Thompson","author":"Uther","year":"2004"},{"key":"2024121909122245200_bib38","volume-title":"Motif-Index of Folk-Literature: A Classification of Narrative Elements in Folktales, Ballads, Myths, Fables, Mediaeval Romances, Exempla, Fabliaux, Jest-Books, and Local Legends","author":"Thompson","year":"1955\u20131958"},{"key":"2024121909122245200_bib39","article-title":"The Hero with a Thousand Faces","author":"Campbell","year":"2008"},{"key":"2024121909122245200_bib40","volume-title":"The Writer\u2019s Journey: Mythic Structure for Writers","author":"Vogler","year":"2020"},{"key":"2024121909122245200_bib41","volume-title":"Morphology of the Folktale","author":"Propp","year":"1968"},{"key":"2024121909122245200_bib42","volume-title":"The Odyssey","author":"Homer","year":"2003"},{"key":"2024121909122245200_bib43","volume-title":"Rumpelstiltskin \u2014 And Other Angry Imps With Rather Unusual Names, Origins of Fairy Tales from Around the World","author":"Carruthers","year":"2015"},{"key":"2024121909122245200_bib44","volume-title":"Hansel and Gretel \u2014 And Other Siblings Forsaken in Forests, Origins of Fairy Tales from Around the World","author":"Carruthers","year":"2015"},{"key":"2024121909122245200_bib45","volume-title":"The Unknown Chekhov: Stories and Other Writings Hitherto Untranslated","author":"Yarmolinsky","year":"1954"},{"key":"2024121909122245200_bib46","volume-title":"The Craft of Fiction","author":"Lubbock","year":"1921"},{"key":"2024121909122245200_bib47","volume-title":"The Third Culture: Beyond the Scientific Revolution","author":"Brockman","year":"1995"},{"key":"2024121909122245200_bib48","volume-title":"Comunicare la matematica","author":"Capozucca","year":"2018"},{"key":"2024121909122245200_bib49","volume-title":"Once Upon an Algorithm: How Stories Explain Computing","author":"Erwig","year":"2011"},{"key":"2024121909122245200_bib50","volume-title":"Scrivere di Scienza","author":"Gouthier","year":"2019"},{"key":"2024121909122245200_bib51","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1007\/978-3-319-72170-5_12","article-title":"Storytelling for tertiary mathematics students","volume-title":"Invited Lectures from the 13th International Congress on Mathematical Education","author":"Harding","year":"2018"},{"key":"2024121909122245200_bib52","volume-title":"The Game\u2019s Afoot!: Game Theory in Myth and Paradox","author":"Mehlmann","year":"2000"},{"key":"2024121909122245200_bib53","volume-title":"Super Simple Storytelling: A Can-Do Guide For Every Classroom","author":"Haven","year":"2000"},{"key":"2024121909122245200_bib54","doi-asserted-by":"crossref","DOI":"10.1163\/9789087907358","volume-title":"Teaching Mathematics As Storytelling","author":"Zazkis","year":"2009"},{"key":"2024121909122245200_bib55","first-page":"247","article-title":"Security is Beautiful","volume-title":"Security Protocols XXIII, Revised Selected Papers. LNCS 9379","author":"Bella","year":"2015"},{"key":"2024121909122245200_bib56","first-page":"125","article-title":"An investigation into the \u201cBeautification\u201d of security ceremonies","volume-title":"Proceedings of the 16th International Joint Conference on e-Business and Telecommunications, ICETE 2019 - Volume 2: SECRYPT, 16th International Conference on Security and Cryptography","author":"Bella","year":"2019"},{"key":"2024121909122245200_bib57","doi-asserted-by":"crossref","DOI":"10.1007\/s13347-022-00552-0","article-title":"Perceptions of beauty in security ceremonies","volume":"35","author":"Bella","year":"2022","journal-title":"Philos Tech"},{"key":"2024121909122245200_bib58","volume-title":"Teaching as Story Telling: An Alternative Approach to Teaching and Curriculum in the Elementary School","author":"Egan","year":"1986"},{"key":"2024121909122245200_bib59","volume-title":"The Back of the Napkin: Solving Problems and Selling Ideas With Pictures","author":"Roam","year":"2008"},{"key":"2024121909122245200_bib60","volume-title":"Show and Tell: How Everybody Can Make Remarkable Presentations","author":"Roam","year":"2014"},{"key":"2024121909122245200_bib61","first-page":"203","article-title":"D. and E.: show and tell, grown up","volume":"53","author":"Nelson","year":"1976","journal-title":"Lang Arts"},{"key":"2024121909122245200_bib62","article-title":"InfoSec cinema: using films for information security teaching","volume-title":"Proceedings of the 2018 USENIX Workshop on Advances in Security Education, ASE, 2018","author":"Blasco","year":"2018"},{"key":"2024121909122245200_bib63","volume-title":"Threats: What Every Engineer Should Learn From Star Wars","author":"Shostack","year":"2023"},{"key":"2024121909122245200_bib64","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1353\/uni.0.0236","article-title":"The changing function of the fairy tale","volume":"12","author":"Zipes","year":"2009","journal-title":"Lion Unicorn"},{"key":"2024121909122245200_bib65","volume-title":"The Epic of Gilgamesh: The Babylonian Epic Poem and Other Texts in Akkadian and Sumerian","year":"2003"},{"key":"2024121909122245200_bib66","volume-title":"Metamorphoses","author":"Ovid","year":"2008"},{"key":"2024121909122245200_bib67","volume-title":"The Iliad","author":"Homer","year":"1987"},{"key":"2024121909122245200_bib68","volume-title":"The Fairy Tales of Science \u2014 A Book for Youth","author":"Brough","year":"1859"},{"key":"2024121909122245200_bib69","volume-title":"Science in Wonderland \u2013 The Scientific Fairy Tales of Victorian Britain","author":"Keene","year":"2015"},{"key":"2024121909122245200_bib70","volume-title":"Learning Together \u2014 Cryptography for Toddlers","author":"Quaglia","year":"2022"},{"key":"2024121909122245200_bib71","volume-title":"Learning Together \u2014 Cyber Security for Toddlers","author":"Quaglia","year":"2022"},{"key":"2024121909122245200_bib72","doi-asserted-by":"crossref","first-page":"422","DOI":"10.1080\/01611194.2016.1238422","article-title":"How to explain modern security concepts to your children","volume":"41","author":"Bultel","year":"2017","journal-title":"Cryptologia"},{"key":"2024121909122245200_bib73","doi-asserted-by":"crossref","first-page":"112","DOI":"10.1007\/978-3-030-91631-2_6","article-title":"How to explain security protocols to your children","volume-title":"Protocols, Strands, and Logic \u2014 Essays Dedicated to Joshua Guttman on the Occasion of his 66.66th Birthday. vol. 13066 of Lecture Notes in Computer Science","author":"Cortier","year":"2021"}],"container-title":["Journal of Cybersecurity"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae005\/61182303\/tyae005.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article-pdf\/10\/1\/tyae005\/61182303\/tyae005.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,19]],"date-time":"2024-12-19T09:12:48Z","timestamp":1734599568000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/cybersecurity\/article\/doi\/10.1093\/cybsec\/tyae005\/7644467"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,1]]},"references-count":73,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2024,1,2]]}},"URL":"https:\/\/doi.org\/10.1093\/cybsec\/tyae005","relation":{},"ISSN":["2057-2085","2057-2093"],"issn-type":[{"value":"2057-2085","type":"print"},{"value":"2057-2093","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2024,1,1]]},"published":{"date-parts":[[2024,1,1]]},"article-number":"tyae005"}}