🤖 AI Summary
This study addresses the lack of an operationalizable definition in existing cognitive security constructs, which hinders effective characterization of how information threats influence human judgment and decision-making. To bridge this gap, the work proposes the first operational framework of human cognitive security behavioral indicators, integrating Bayesian inference, affect-modulated decision valuation, and cognitive resource allocation mechanisms into a unified computational model. This model systematically links information environments to three key behavioral outcomes: truth discernment, task-oriented actions, and information sharing. The model successfully reproduces established cognitive phenomena—including judgment heuristics, the illusory truth effect (R² = 0.86), and the dissociation between discernment and sharing behaviors—thereby closing the gap between conceptual definitions and empirical measurement. It offers a novel paradigm for advancing cognitive security theory and designing effective defensive interventions.
📝 Abstract
Human decision-making under uncertainty faces growing challenges from information-based threats that pose risks to human cognitive processes and behavior. Although their potential harm is widely acknowledged, there remains no well-defined construct for characterizing the degree to which information-based threats influence changes in human judgments and decision-making, impeding theoretical advancement, measurement, and effective countermeasure development. Here, we introduce a human cognitive security construct focused on linking information-based threats to observable outcomes to bridge field-level definitions with operational measures by drawing from core mechanisms related to information processing and decision-making. To connect the information environment to behavior, we develop an integrative modeling framework that unifies Bayesian inference with affect-modulated decision valuation, capturing how cognitive resource allocation and affective valuation shape three core behavioral outcomes: veracity discernment, task-oriented actions, and information sharing. Through computational simulations, we demonstrate that this framework explains canonical phenomena, including cognitive heuristics, the illusory truth effect (R2=0.86, validated against empirical data), and incongruent veracity discernment and sharing behavior. We propose empirically grounded behavioral outcome measures of cognitive security to guide future empirical examinations. Finally, we outline how environment-specific elements, characterized by data availability and ecological constraints, affect individuals' cognitive security and identify future research directions.