M. Adeka, S. Shepherd, and R. Abd-alhameed, Resolving the Password Security Purgatory in the Contexts of Technology, Security and Human Factors, IEEE International Conference on Computer Applications Technology, pp.1-7, 2013.

J. Bonneau, The Science of Guessing: Analyzing an Anonymized Corpus of 70 Million Passwords, IEEE Symposium on Security and Privacy, vol.2012, pp.538-552, 2012.

D. Wang, H. Cheng, Q. Gu, and P. Wang, Understanding Passwords of Chinese Users: Characteristics, Security and Implications, pp.1-14, 2015.

D. L. Wheeler, zxcvbn: Low-Budget Password Strength Estimation, Proceedings of the 25th USENIX Security Symposium, pp.157-173, 2016.

J. Bonneau and R. Xu, Of Contrase?nas, ?,!???????? and ?????? Character Encoding Issues for wWeb Passwords, pp.1-8, 2012.

Z. Li, W. Han, and W. Xu, A Large-Scale Empirical Analysis of Chinese Web Passwords, proceedings of the 23rd USENIX Security Symposium, pp.559-574, 2014.

C. Yang, J. L. Hung, and Z. Lin, An Analysis View on Password Patterns of Chinese Internet Users, Nankai Business Review International, vol.4, issue.1, pp.66-77, 2013.

D. Wang, Z. Zhang, P. Wang, J. Yan, and X. Huang, Targeted Online Password Guessing: An Underestimated Threat, proceedings of the 23rd ACM Conference on Computer and Communications Security, pp.1242-1254, 2016.

A. Deumert and K. V. Lexander, Texting Africa: Writing as Performance, Journal of Sociolinguistics, vol.17, issue.4, pp.522-546, 2013.

K. V. Lexander, Texting and African Language Literacy, New Media & Society, vol.13, issue.3, pp.427-443, 2011.

A. G. Voyiatzis, C. A. Fidas, D. N. Serpanos, and N. M. Avouris, An Empirical Study on the Web Password Strength in Greece, Proceedings of the 15 th Panhellenic Conference on Informatics, pp.212-216, 2011.

C. Stork, E. Calandro, and A. Gillwald, Internet Going Mobile: Internet Access and Use in 11 African countries. Info, vol.15, pp.34-51, 2013.

R. Shay, S. Komanduri, A. L. Durity, P. Huh, M. L. Mazurek et al., Designing Password Policies for Strength and Usability, Transactions on Information and System Security, vol.4, issue.13, p.34, 2016.

D. Shin, A Socio-technical Framework for Internet-of-Things Design: A Human-centered Design for the Internet of Things, Telematics and Informatics, vol.31, pp.519-531, 2014.

N. Mercer and C. Howe, Explaining the Dialogic Processes of Teaching and Learning: The Value and Potential of Sociocultural Theory. Learning, Culture and Social Interaction, pp.12-21, 2012.

J. P. Lantolf, S. L. Thorne, and M. E. Poehner, Social Theory and Second Language Development, Theories in Second Language Acquisition, p.Routledge, 2015.

J. P. Lantolf, Introducing Sociocultural Theory. Sociocultural Theory and Second Language Learning, pp.1-26, 2000.

B. Ur, F. Noma, J. Bees, S. M. Segreti, R. Shay et al., I Added '!' at the End to Make It Secure": Observing Password Creation in the Lab, Symposium on Usable Privacy and Security (SOUPS), pp.123-140, 2015.

S. Marginson and T. K. Dang, Vygotsky's Sociocultural Theory in The Context of Globalization, Asia Pacific Journal of Education, vol.37, issue.1, pp.116-129, 2017.

E. Von-zezschwitz, A. De-luca, and H. Hussmann, Survival of the Shortest: A Retrospective Analysis of Influencing Factors on Password Composition, Proceedings of the International Federation for Information Conference on Human-Computer Interaction, pp.460-467, 2013.

M. Jakobsson and M. Dhiman, The Benefits of Understanding Passwords. Mobile Authentication, vol.2013, pp.5-24, 2013.

R. L. Baskerville, M. Kaul, and V. C. Storey, Genres of Inquiry in Design-Science Research: Justification and Evaluation of Knowledge Production. Mis Quarterly, vol.39, pp.541-564, 2015.

R. Shay, S. Komanduri, P. G. Kelley, P. G. Leon, M. L. Mazurek et al., Encountering Stronger Password Requirements: User Attitudes and Behavior, Proceedings of a Symposium on Usable Privacy and Security (SOUPS), pp.1-20, 2010.

S. Komanduri, Modeling the Adversary to Evaluate Password Strength With Limited Samples, pp.1-270, 2016.

J. Campbell, W. Ma, and D. Kleeman, Impact of Restrictive Composition Policy on User Password Choices, Behaviour & Information Technology, vol.30, issue.3, pp.379-388, 2011.

X. De-carnavalet and M. Mannan, From Very Weak to Very Strong: Analyzing PasswordStrength Meters. NDSS, vol.14, pp.23-26, 2014.

J. Blocki, S. Komanduri, A. D. Procaccia, and O. Sheffet, Optimizing Password Composition Policies, pp.1-27, 2013.

D. Florêncio, C. Herley, and P. C. Van-oorschot, An Administrator's Guide to Internet Password Research, Proceedings of the 28th Large Installation System Administration Conference, pp.35-52, 2014.