L. O'gorman, Comparing passwords, tokens, and biometrics for user authentication. Proceedings of the IEEE, vol.91, pp.2021-2040, 2003.

F. Mwagwabi, T. Mcgill, and M. Dixon, Improving Compliance with Password Guidelines: How User Perceptions of Passwords and Security Threats Affect Compliance with Guidelines, 47th Hawaii International Conference on System Sciences, pp.3188-3197, 2014.

S. Van-acker, D. Hausknecht, W. Joosen, and A. Sabelfeld, Password Meters and Generators on the Web: From Large-Scale Empirical Study to Getting It Right, Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, pp.253-262, 2015.

A. Vance, D. Eargle, K. Ouimet, and D. Straub, Enhancing Password Security through Interactive Fear Appeals: A Web-Based Field Experiment, 46th Hawaii International Conference on System Sciences, pp.2988-2997, 2013.

,

X. Carnavalet, . De-c.-de, and M. Mannan, From Very Weak to Very Strong: Analyzing Password-Strength Meters, 2014.

T. H. Kim, .. Stuart, H. C. Hsiao, H. Lin, Y. Zhang et al., YourPassword: Applying Feedback Loops to Improve Security Behavior of Managing Multiple Passwords, Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, pp.513-518, 2014.

,

B. Ur, P. G. Kelley, S. Komanduri, J. Lee, M. Maass et al., How Does Your Password Measure Up? The Effect of Strength Meters on Password Creation, Proceedings of the 21st USENIX Conference on Security Symposium, pp.5-5, 2012.

R. Bénabou and J. Tirole, Intrinsic and Extrinsic Motivation, Rev Econ Stud, vol.70, pp.489-520, 2003.

P. Lowry, J. Gaskin, N. Twyman, B. Hammer, and T. Roberts, Taking "Fun and Games" Seriously: Proposing the Hedonic-Motivation System Adoption Model (HMSAM), Journal of the Association for Information Systems, vol.14, 2013.

S. Furnell and N. Bär, Essential Lessons Still Not Learned? Examining the Password Practices of End-Users and Service Providers, Human Aspects of Information Security, Privacy, and Trust, pp.217-225, 2013.

S. R. Boss, D. F. Galletta, P. Benjamin-lowry, G. D. Moody, and P. Polak, What Do Systems Users Have to Fear? Using Fear Appeals to Engender Threats and Fear That Motivate Protective Security Behaviors, MIS Quarterly, vol.39, pp.837-864, 2015.

J. D'arcy and T. Herath, A review and analysis of deterrence theory in the IS security literature: making sense of the disparate findings, Eur J Inf Syst, vol.20, pp.643-658, 2011.

A. C. Johnston and M. Warkentin, Fear Appeals and Information Security Behaviors: An Empirical Study, MIS Quarterly, vol.34, pp.549-553, 2010.

M. Gagné and E. L. Deci, Self-determination theory and work motivation, Journal of Organizational Behavior, vol.26, pp.331-362, 2005.

R. M. Ryan and E. L. Deci, Intrinsic and Extrinsic Motivations: Classic Definitions and New Directions, Contemporary Educational Psychology, vol.25, pp.54-67, 2000.

,

E. L. Deci and R. M. Ryan, Handbook of self-determination research, 2002.

S. Egelman, A. Sotirakopoulos, I. Muslukhov, K. Beznosov, and C. Herley, Does My Password Go Up to Eleven?: The Impact of Password Meters on Password Selection, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp.2379-2388, 2013.

S. Deterding, The Lens of Intrinsic Skill Atoms: A Method for Gameful Design. Human-Computer Interaction, vol.30, pp.294-335, 2015.

J. Hamari, J. Koivisto, and H. Sarsa, Does Gamification Work? -A Literature Review of Empirical Studies on Gamification, 47th Hawaii International Conference on System Sciences, pp.3025-3034, 2014.

C. Kroeze and M. S. Olivier, Information Security for South Africa, pp.1-8, 2012.

J. Ophoff and M. Janowski, Examining Gamification as a Driver of Individual Information Security Behavior, Conference Proceedings of the 2015 Dewald Roode Workshop on Information Systems Security Research, IFIP WG8.11/WG11.13. Delaware, 2015.

S. Deterding, D. Dixon, R. Khaled, and L. Nacke, From Game Design Elements to Gamefulness: Defining "Gamification, Proceedings of the 15th International Academic Mind-Trek Conference: Envisioning Future Media Environments, pp.9-15, 2011.

P. W. Jordan, Designing Pleasurable Products: An Introduction to the New Human Factors, 2000.

P. Zhang, Technical Opinion: Motivational Affordances: Reasons for ICT Design and Use, Commun. ACM, vol.51, pp.145-147, 2008.

I. Blohm and J. Leimeister, Gamification -Design of IT-Based Enhancing Services for Motivational Support and Behavioral Change, Business & Information Systems Engineering, vol.5, pp.275-278, 2013.

S. Thiebes, S. Lins, and D. Basten, Gamifying Information Systems -A Synthesis of Gamification Mechanics and Dynamics, Proceedings, 2014.

R. Shay, L. Bauer, N. Christin, L. F. Cranor, A. Forget et al., A Spoonful of Sugar?: The Impact of Guidance and Feedback on Password-Creation Behavior, Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, pp.2903-2912, 2015.

J. W. Creswell, Research Design: Qualitative, Quantitative and Mixed Methods Approaches, 2014.

M. T. Orne, Demand Characteristics and the Concept of Quasi-Controls 1, Artifacts in Behavioral Research, 2009.

,

D. Wheeler, zxcvbn: realistic password strength estimation, 2012.

H. L. O'brien, P. Cairns, and M. Hall, A practical approach to measuring user engagement with the refined user engagement scale (UES) and new UES short form, International Journal of Human-Computer Studies, vol.112, pp.28-39, 2018.