{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,5]],"date-time":"2026-05-05T02:48:05Z","timestamp":1777949285514,"version":"3.51.4"},"publisher-location":"Singapore","reference-count":35,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819578252","type":"print"},{"value":"9789819578269","type":"electronic"}],"license":[{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T00:00:00Z","timestamp":1767225600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-981-95-7826-9_4","type":"book-chapter","created":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T22:26:53Z","timestamp":1777847213000},"page":"57-77","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Keep it Simple, or\u00a0Teach Them Logics: Attack-Defense Tree Perception by\u00a0Laypeople"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3755-7171","authenticated-orcid":false,"given":"Florian","family":"Dorfhuber","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2500-7431","authenticated-orcid":false,"given":"Marisol","family":"Barrientos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7735-8751","authenticated-orcid":false,"given":"Julia","family":"Eisentraut","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8122-2881","authenticated-orcid":false,"given":"Jan","family":"K\u0159et\u00ednsk\u00fd","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2026,4,1]]},"reference":[{"key":"4_CR1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-41987-5","volume-title":"The NICE Cyber Security Framework","author":"I Alsmadi","year":"2020","unstructured":"Alsmadi, I., Easttom, C.: The NICE Cyber Security Framework. Springer, Cham (2020)"},{"key":"4_CR2","unstructured":"Attridge, N., Aberdein, A., Inglis, M.: Does studying logic improve logical reasoning? (2016)"},{"key":"4_CR3","volume-title":"Principles of Model Checking","author":"C Baier","year":"2008","unstructured":"Baier, C., Katoen, J.P.: Principles of Model Checking. MIT Press, Cambridge (2008)"},{"key":"4_CR4","doi-asserted-by":"crossref","unstructured":"Berkowitz, M., Stern, E.: Which cognitive abilities make the difference? Predicting academic achievements in advanced stem studies. J. Intell. 6 (2018)","DOI":"10.3390\/jintelligence6040048"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Broccia, G., ter Beek, M.H., Lluch Lafuente, A., Spoletini, P., Ferrari, A.: Assessing the understandability and acceptance of attack-defense trees for modelling security requirements. In: International Working Conference on Requirements Engineering: Foundation for Software Quality, pp. 39\u201356. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-57327-9_3"},{"key":"4_CR6","doi-asserted-by":"publisher","unstructured":"Bronkhorst, H., Roorda, G., Suhre, C., Goedhart, M.: Logical reasoning in formal and everyday reasoning tasks. Int. J. Sci. Math. Educ. 18 (2019). https:\/\/doi.org\/10.1007\/s10763-019-10039-8","DOI":"10.1007\/s10763-019-10039-8"},{"key":"4_CR7","doi-asserted-by":"publisher","unstructured":"Buldas, A., Gadyatskaya, O., Lenin, A., Mauw, S., Trujillo-Rasua, R.: Attribute evaluation on attack trees with incomplete information. Comput. Secur. 88 (2020). https:\/\/doi.org\/10.1016\/J.COSE.2019.101630","DOI":"10.1016\/J.COSE.2019.101630"},{"key":"4_CR8","doi-asserted-by":"publisher","unstructured":"Chowdhury, P.D., Hallett, J., Patnaik, N., Tahaei, M., Rashid, A.: Developers are neither enemies nor users: they are collaborators. In: 2021 IEEE Secure Development Conference (SecDev), pp. 47\u201355 (2021). https:\/\/doi.org\/10.1109\/SecDev51306.2021.00023","DOI":"10.1109\/SecDev51306.2021.00023"},{"key":"4_CR9","unstructured":"Chuttur, M.Y.: Overview of the technology acceptance model: origins, developments and future directions (2009)"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Dorfhuber, F., Eisentraut, J., Klioba, K., K\u0159et\u00ednsk\u00fd, J.: QuADTool: attack-defense-tree synthesis, analysis and bridge to verification. In: International Conference on Quantitative Evaluation of Systems and Formal Modeling and Analysis of Timed Systems, pp. 52\u201371. Springer, Cham (2024)","DOI":"10.1007\/978-3-031-68416-6_4"},{"key":"4_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1007\/978-3-030-85315-0_13","volume-title":"Theoretical Aspects of Computing \u2013 ICTAC 2021","author":"J Eisentraut","year":"2021","unstructured":"Eisentraut, J., Holzer, S., Klioba, K., K\u0159et\u00ednsk\u00fd, J., Pin, L., Wagner, A.: Assessing security of cryptocurrencies with attack-defense trees: proof of concept and future directions. In: Cerone, A., \u00d6lveczky, P.C. (eds.) ICTAC 2021. LNCS, vol. 12819, pp. 214\u2013234. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-85315-0_13"},{"key":"4_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/978-3-030-30281-8_12","volume-title":"Quantitative Evaluation of Systems","author":"J Eisentraut","year":"2019","unstructured":"Eisentraut, J., K\u0159et\u00ednsk\u00fd, J.: Expected cost analysis of attack-defense trees. In: Parker, D., Wolf, V. (eds.) QEST 2019. LNCS, vol. 11785, pp. 203\u2013221. Springer, Cham (2019). https:\/\/doi.org\/10.1007\/978-3-030-30281-8_12"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Fillion, N.: Logical methodology and the structure of logic syllabi. In: Research in History and Philosophy of Mathematics: The CSHPM 2022, pp. 1\u201314. Springer, Cham (2023)","DOI":"10.1007\/978-3-031-46193-4_1"},{"key":"4_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1007\/978-3-662-49635-0_9","volume-title":"Principles of Security and Trust","author":"H Hermanns","year":"2016","unstructured":"Hermanns, H., Kr\u00e4mer, J., Kr\u010d\u00e1l, J., Stoelinga, M.: The value of attack-defence diagrams. In: Piessens, F., Vigan\u00f2, L. (eds.) POST 2016. LNCS, vol. 9635, pp. 163\u2013185. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49635-0_9"},{"key":"4_CR15","doi-asserted-by":"publisher","unstructured":"Hong, J.B., Kim, D.S., Chung, C.J., Huang, D.: A survey on the usability and practical applications of graphical security models. Comput. Sci. Rev. 26, 1\u201316 (2017). https:\/\/doi.org\/10.1016\/j.cosrev.2017.09.001. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013716301083","DOI":"10.1016\/j.cosrev.2017.09.001"},{"key":"4_CR16","unstructured":"IBM: Cost of a data breach IBM report (2024). https:\/\/www.ibm.com\/reports\/data-breach. Accessed 07 Oct 2024"},{"issue":"1","key":"4_CR17","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1080\/13562510020029572","volume":"6","author":"P Ikuenobe","year":"2001","unstructured":"Ikuenobe, P.: Teaching and assessing critical thinking abilities as outcomes in an informal logic course. Teach. High. Educ. 6(1), 19\u201332 (2001)","journal-title":"Teach. High. Educ."},{"key":"4_CR18","doi-asserted-by":"crossref","unstructured":"Kordy, B., Mauw, S., Radomirovi\u0107, S., Schweitzer, P.: Foundations of attack-defense trees. In: Proceedings of the 7th International Conference on Formal Aspects of Security and Trust, FAST 2010, pp. 80\u201395. Springer, Heidelberg (2011). http:\/\/dl.acm.org\/citation.cfm?id=1964555.1964561","DOI":"10.1007\/978-3-642-19751-2_6"},{"key":"4_CR19","doi-asserted-by":"publisher","unstructured":"Kordy, B., Pi\u00e8tre-Cambac\u00e9d\u00e8s, L., Schweitzer, P.: Dag-based attack and defense modeling: don\u2019t miss the forest for the attack trees. Comput. Sci. Rev. 13 (2013). https:\/\/doi.org\/10.1016\/j.cosrev.2014.07.001","DOI":"10.1016\/j.cosrev.2014.07.001"},{"key":"4_CR20","doi-asserted-by":"publisher","unstructured":"Lallie, H., Debattista, K., Bal, J.: Evaluating practitioner cyber-security attack graph configuration preferences. Comput. Secur. 79 (2018). https:\/\/doi.org\/10.1016\/j.cose.2018.08.005","DOI":"10.1016\/j.cose.2018.08.005"},{"issue":"5","key":"4_CR21","doi-asserted-by":"publisher","first-page":"1110","DOI":"10.1109\/TIFS.2017.2771238","volume":"13","author":"HS Lallie","year":"2018","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: An empirical evaluation of the effectiveness of attack graphs and fault trees in cyber-attack perception. IEEE Trans. Inf. Forensics Secur. 13(5), 1110\u20131122 (2018). https:\/\/doi.org\/10.1109\/TIFS.2017.2771238","journal-title":"IEEE Trans. Inf. Forensics Secur."},{"key":"4_CR22","doi-asserted-by":"publisher","unstructured":"Lallie, H.S., Debattista, K., Bal, J.: A review of attack graph and attack tree visual syntax in cyber security. Comput. Sci. Rev. 35, 100219 (2020). https:\/\/doi.org\/10.1016\/j.cosrev.2019.100219. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1574013719300772","DOI":"10.1016\/j.cosrev.2019.100219"},{"key":"4_CR23","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/s10209-014-0348-1","volume":"14","author":"N Maranguni\u0107","year":"2015","unstructured":"Maranguni\u0107, N., Grani\u0107, A.: Technology acceptance model: a literature review from 1986 to 2013. Univ. Access Inf. Soc. 14, 81\u201395 (2015)","journal-title":"Univ. Access Inf. Soc."},{"issue":"4827","key":"4_CR24","doi-asserted-by":"publisher","first-page":"625","DOI":"10.1126\/science.3672116","volume":"238","author":"RE Nisbett","year":"1987","unstructured":"Nisbett, R.E., Fong, G.T., Lehman, D.R., Cheng, P.W.: Teaching reasoning. Science 238(4827), 625\u2013631 (1987)","journal-title":"Science"},{"key":"4_CR25","unstructured":"Norman, D.A.: The Design of Everyday Things. Basic Books Inc., USA (2002)"},{"key":"4_CR26","doi-asserted-by":"publisher","unstructured":"Oliveira, D., Rosenthal, M., Morin, N., Yeh, M., Cappos, J., Zhuang, Y.: It\u2019s the psychology stupid: how heuristics explain software vulnerabilities and how priming can illuminate developer\u2019s blind spots (2014). https:\/\/doi.org\/10.1145\/2664243.2664254","DOI":"10.1145\/2664243.2664254"},{"issue":"5","key":"4_CR27","doi-asserted-by":"publisher","first-page":"916","DOI":"10.1016\/j.infsof.2008.05.013","volume":"51","author":"AL Opdahl","year":"2009","unstructured":"Opdahl, A.L., Sindre, G.: Experimental comparison of attack trees and misuse cases for security threat identification. Inf. Softw. Technol. 51(5), 916\u2013932 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"4_CR28","unstructured":"Schiele, N.D., Gadyatskaya, O.: A limited technical background is sufficient for attack-defense tree acceptability. arXiv preprint arXiv:2502.11920 (2025)"},{"key":"4_CR29","unstructured":"Schneier, B.: Attack trees, modeling security threats. Dr. Dobb\u2019s Journal (1999). https:\/\/www.schneier.com\/academic\/archives\/1999\/12\/attack_trees.html"},{"key":"4_CR30","doi-asserted-by":"publisher","unstructured":"Segers, E., Verhoeven, L.: How logical reasoning mediates the relation between lexical quality and reading comprehension. Reading Writing 29 (2016). https:\/\/doi.org\/10.1007\/s11145-015-9613-9","DOI":"10.1007\/s11145-015-9613-9"},{"key":"4_CR31","volume-title":"Threat Modeling: Designing for Security","author":"A Shostack","year":"2014","unstructured":"Shostack, A.: Threat Modeling: Designing for Security. Wiley, Hoboken (2014)"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Simons, D.J., et al.: Do \u201cbrain-training\u201d programs work? Psychol. Sci. Public Interest 17(3), 103\u2013186 (2016)","DOI":"10.1177\/1529100616661983"},{"key":"4_CR33","unstructured":"Steve, M.: Special report: Cyberwarfare in the c-suite. https:\/\/cybersecurityventures.com\/hackerpocalypse-cybercrime-report-2016\/. Accessed 26 Mar 2022"},{"key":"4_CR34","doi-asserted-by":"publisher","unstructured":"Tatam, M., Shanmugam, B., Azam, S., Kannoorpatti, K.: A review of threat modelling approaches for apt-style attacks. Heliyon 7(1), e05969 (2021). https:\/\/doi.org\/10.1016\/j.heliyon.2021.e05969. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S2405844021000748","DOI":"10.1016\/j.heliyon.2021.e05969"},{"issue":"4","key":"4_CR35","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3331524","volume":"52","author":"W Widel","year":"2019","unstructured":"Widel, W., Audinot, M., Fila, B., Pinchinat, S.: Beyond 2014: formal methods for attack tree-based security modeling. ACM Comput. Surv. (CSUR) 52(4), 1\u201336 (2019)","journal-title":"ACM Comput. Surv. (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering. Theories, Tools, and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-95-7826-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,5,3]],"date-time":"2026-05-03T22:26:55Z","timestamp":1777847215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-95-7826-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026]]},"ISBN":["9789819578252","9789819578269"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-981-95-7826-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2026]]},"assertion":[{"value":"1 April 2026","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SETTA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Symposium on Dependable Software Engineering: Theories, Tools, and Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Oxford","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 December 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"setta2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.setta2025.uk\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}