Search papers, labs, and topics across Lattice.
This paper introduces a human cognitive security construct to link information-based threats to observable outcomes by unifying Bayesian inference with affect-modulated decision valuation. The integrative modeling framework captures how cognitive resource allocation and affective valuation shape veracity discernment, task-oriented actions, and information sharing. Computational simulations demonstrate the framework explains cognitive heuristics, the illusory truth effect (R2=0.86), and incongruent veracity discernment and sharing behavior.
A new computational model reveals how information-based threats hijack human cognition, linking Bayesian inference and emotional valuation to predict susceptibility to manipulation.
Human decision-making under uncertainty faces growing challenges from information-based threats that pose risks to human cognitive processes and behavior. Although their potential harm is widely acknowledged, there remains no well-defined construct for characterizing the degree to which information-based threats influence changes in human judgments and decision-making, impeding theoretical advancement, measurement, and effective countermeasure development. Here, we introduce a human cognitive security construct focused on linking information-based threats to observable outcomes to bridge field-level definitions with operational measures by drawing from core mechanisms related to information processing and decision-making. To connect the information environment to behavior, we develop an integrative modeling framework that unifies Bayesian inference with affect-modulated decision valuation, capturing how cognitive resource allocation and affective valuation shape three core behavioral outcomes: veracity discernment, task-oriented actions, and information sharing. Through computational simulations, we demonstrate that this framework explains canonical phenomena, including cognitive heuristics, the illusory truth effect (R2=0.86, validated against empirical data), and incongruent veracity discernment and sharing behavior. We propose empirically grounded behavioral outcome measures of cognitive security to guide future empirical examinations. Finally, we outline how environment-specific elements, characterized by data availability and ecological constraints, affect individuals'cognitive security and identify future research directions.