References
[1]. Adams, A., & Sasse, M. A. (1999). Users are not the enemy. Communications of the ACM, 42(12), 40-46.
[2]. Baumeister, R. F., Vohs, K. D., & Tice, D. M. (2007). The strength model of self-control. Current Directions in Psychological Science, 16(6), 351-355.
[3]. Brady,W & Bavel, J. V. (2018). Inducing Emotions. In Social Psychology. Retrieved from https://www.jove.com/ science-education-library/30/ social-psychology.
[4]. Bryant, K., & Campbell, J. (2006). User behaviours associated with password security and management. Australasian Journal of Information Systems, 14(1), 81-100.
[5]. Chiasson, S., van Oorschot, P. C., & Biddle, R. (2006). A Usability Study and Critique of Two Password Managers. In USENIX Security Symposium (Vol. 15, pp. 1-16).
[6]. Florencio, D., & Herley, C. (2007). A large-scale study of web password habits. In Proceedings of the 16 international conference on World Wide Web (pp. 657- 666).
[7]. Gollmann, D. (2010). Computer security. Wiley Interdisciplinary Reviews: Computational Statistics, 2(5), 544-554.
[8]. Gross, T., Coopamootoo, K. P., Al-Jabri, A.(2016). Effect of Cognitive Effort on Password Choice. In Twelfth Symposium on Usable Privacy and Security (pp. 55-66).
[9]. Hartley, L. R., Penna, F., Corry, A., & Feyer, A. M. (1997). Comprehensive Review of Fatigue Research. Murdoch University, Institute for Research in Safety & Transport.
[10]. John, O. P., & Srivastava, S. (1999). The Big Five trait taxonomy: History, measurement, and theoretical perspectives. Handbook of Personality: Theory and Research, 2(1999), 102-138. New York: Guilford Press.
[11]. Lerner, J. S., Small, D. A., & Loewenstein, G. (2004). Heart strings and purse strings: Carryover effects of emotions on economic decisions. Psychological Science, 15(5), 337-341.
[12]. MacLeod, C. M. (2015). The stroop effect. Encyclopedia of Color Science and Technology. Berlin: Springer.
[13]. Muraven, M., Tice, D. M., & Baumeister, R. F. (1998). Self-control as a limited resource: Regulatory depletion patterns. Journal of Personality and Social Psychology, 74(3), 774-789.
[14]. Rammstedt, B., & John, O. P. (2007). Measuring personality in one minute or less: A 10-item short version of the Big Five Inventory in English and German. Journal of Research in Personality, 41(1), 203-212.
[15]. Rauch, W., & Schmitt, K. (2009). Fatigue of cognitive control in the stroop-task. In Proceedings of the Annual Meeting of the Cognitive Science Society (Vol. 31, No. 31). pp. 750-755, 2009.
[16]. Reichl, D. (2018). Password Quality Estimation. In KeePass.info. Retrieved from https://keepass.info/help/kb/ pw_quality_est.html
[17]. Stobert, E., & Biddle, R. (2014). The Password Life th Cycle: User Behaviour in Managing Passwords. In 10 Symposium on Usable Privacy and Security. pp. 243-255.
[18]. Watson, D., Clark, L. A., & Tellegen, A. (1988). Development and validation of brief measures of positive and negative affect: the PANAS scales. Journal of Personality and Social Psychology, 54(6), 1063- 1070.
[19]. Wegner, D. M., Schneider, D. J., Carter, S. R., & White, T. L. (1987). Paradoxical effects of thought suppression. Journal of Personality and Social Psychology, 53(1), 5-13.
[20]. Wheeler, D. L. (2016). zxcvbn: Low-Budget Password Strength Estimation. In USENIX Security Symposium (pp. 157- 173).