M. T. ChiR. Wylie 2014 The ICAP framework: Linking cognitive engagement to active learning outcomes Educational Psychologist 49 4 219 243
S. ChiassonP. C. van OorschotR. Biddle 2007 Graphical password authentication using cued click points In European Symposium on Research in Computer Security 359 374 Springer.
CHORUS Lab 2017 Secure Comics http://versipass.com/edusec/securecomics
K. CraikJ. Williams 1967 The nature of explanation 445 CUP Archive
J. DempseyB. CassidyG. Sim 2016 Child-centered security In British HCI BCS e-WIC
F. N. Dempster 1981 Memory span: Sources of individual and developmental differences Psychological Bulletin 89 1 63
R. DhamijaA. Perrig 2000 De' ja vu - a user study: Using images for authentication USENIX Security Symposium 9 1 4
S. EgelmanE. Peer 2015 Scaling the security wall: Developing a security behavior intentions scale (sebis) In Human Factors in Computing Systems 2873 2882 ACM
G. FriedlandR. Sommer 2010 Cybercasing the joint: On the privacy implications of geotagging In USENIX Workshop on Hot Topics in Security
R. M. GagneW. W. WagerK. C. GolasJ. M. KellerJ. D. Russell 2005 Principles of instructional design Wiley Online Library
F. P. Hughes 2009 Children, play, and development Sage
D. Jacobs 2007 More than words: Comics as a means of teaching multiple literacies English Journal 19 25
B. KnijnenburgD. Cherry 2016 Comics as a medium for privacy notices In Symposium on Usable Privacy and Security (SOUPS) USENIX Association
P. KumaraguruY. RheeS. ShengS. HasanA. AcquistiL. F. CranorJ. Hong 2007 Getting users to pay attention to anti-phishing education: Evaluation of retention and transfer In APWG eCrime Summit 70 81 ACM
A. M. Leslie 1987 Pretense and representation: The origins of “theory of mind.” Psychological review 94 4 412
M. A. Marchetto 2014 Cancer vixen: A true story Pantheon
Medikidz 2016 Accessed September Medikidz: Medical information for kids http://www.medikidz.com/gb-en/
A. NegreteC. Lartigue 2004 Learning from education to communicate science as a good story Endeavour 28 3 120 124
A. Paivio 1991 Dual coding theory: Retrospect and current status Canadian Journal of Psychology 45 3 255
J. Piaget 2002 Judgement and reasoning in the child Routledge
J. R. RauschS. E. MaxwellK. Kelley 2003 Analytic methods for questions pertaining to a randomized pretest, posttest, follow-up design Journal of Clinical Child and Adolescent Psychology 32 3 467 486
J. C. ReadS. MacFarlane 2006 Using the fun toolkit and other survey methods to gather opinions in child computer interaction in interaction design and children 81 88 ACM
A. M. Rose 1958 Mental health attitudes of youth as influenced by a comic strip Journalism & Mass Communication Quarterly 35 3 333 342
R. A. SchmidtR. A. Bjork 1992 New conceptualizations of practice: Common principles in three paradigms suggest new concepts for training Psychological Science 3 4 207 217
M. SharplesR. GraberC. HarrisonK. Logan 2009 E-safety and web 2.0 for children aged 11-16 Journal of Computer Assisted Learning 25 70 84
S. SrikwanM. Jakobsson 2008 Using cartoons to teach internet security Cryptologia 32 2 137 154
V. Steeves 2012 Young Canadians in a wired world, phase III: Talking to youth and parents about life online
K. Swan 2000 Nonprint media and technol- ogy literacy standards for assessing technology integration Journal of Educational Computing Research 23 1 85 100
The Office of the Privacy Commissioner of Canada 2016 September Social Smarts: Privacy, the internet and you https://www.priv.gc.ca/en/about-the-opc/what-we-do/awareness-campaigns-and-events/privacy-education-for-kids/social-smarts-privacy-the-internet-and-you/
M. TreanorM. Mateas 2009 Newsgames: Procedural rhetoric meets political cartoons Digital Games Research Association 2009
P. TurnerJ. T. Harviainen 2016 Digital Make-Believe Springer International Publishing
K. L. Walton 1990 Mimesis as make-believe: On the foundations of the representational arts Harvard University Press
A. WhittenJ. D. Tygar 1999 Why Johnny can’t encrypt: A usability evaluation of PGP 5.0. In USENIX Security Symposium
G. Yang 2016 September Comics in education http://www.humblecomics.com/comicsedu/index.html
L Zhang-KennedyS ChiassonR Biddle 2014 Stop clicking on ‘update later’: Persuading users they need up-to-date antivirus protection in Persuasive Technology 302 322 Springer
L Zhang-KennedyS ChiassonR Biddle 2016 The role of instructional design in persuasion: A comics approach for improving cybersecurity International Journal of HumanComputer Interaction 32 3 215 257
L. Zhang-KennedyC. MekhailY. AbdelazizS. Chiasson 2016 From nosy little brothers to stranger-danger: Children and parents’ perception of mobile threats Interaction Design and children 388 399 ACM