R. (2006, August). A Usability Study and Critique of Two Password Managers. In Usenix Security (Vol. 6). Clarke, A. E., & Star, S. L. (2008). The social worlds framework: A theory/methods package. The Handbook of Science & Technology Studies, 3, 113-137. Dewey, C. (2015, July 1). Mark Zuckerberg says the future of communication is telepathy. Here’s how that would actually work. Washington Post. Retrieved from https://www.washingtonpost.com/news/the-intersect/wp/2015/07/01/mark-zuckerberg-says-the-future-of-communication-is-telepathy-heres-how-tha t-would-actually-work/ Goodin, D. (2015, November 2). Hacking tool swipes encrypted credentials from password manager. ars technica. Retrieved from http://arstechnica.com/security/2015/11/hacking-tool-swipes-encrypted-credentials-from-password-manager/ Ion, I., Reeder, R., & Consolvo, S. (2015). “... no one can hack my mind”: Comparing Expert and Non-Expert Security Practices. In Eleventh Symposium on Usable Privacy and Security (SOUPS 2015) (pp. 327-346). Khandelwal, S. (2016, July 27). LastPass bug lets hackers steal all your passwords. The Hacker News. Retrieved from http://thehackernews.com/2016/07/lastpass-password-manager.html Titcomb, J. (2015, October 19). Password manager 1Password criticised for leaking users’ bookmarks. The Telegraph. Retrieved from http://www.telegraph.co.uk/technology/internet-security/11939920/Password-manager-1Password-criticised-for-leaking-users-bookmarks.html