Behavioral Outcomes of Human Cognitive Security within an Integrative Modeling Framework
- URL: http://arxiv.org/abs/2603.01355v1
- Date: Mon, 02 Mar 2026 01:26:12 GMT
- Title: Behavioral Outcomes of Human Cognitive Security within an Integrative Modeling Framework
- Authors: Aaron R. Allred, Erin E. Richardson, Sarah R. Bostrom, James Crum, Chad Tossell, Richard E. Niemeyer, Leanne Hirshfield, Allison P. A. Hayman,
- Abstract summary: Information-based threats pose challenges to human cognitive processes and behavior.<n>There is no well-defined construct for characterizing the degree to which information-based threats influence changes in human judgments and decision-making.<n>Here, we introduce a human cognitive security construct focused on linking information-based threats to observable outcomes.
- Score: 0.0
- License: http://arxiv.org/licenses/nonexclusive-distrib/1.0/
- Abstract: Human decision-making under uncertainty faces growing challenges from information-based threats that pose risks to human cognitive processes and behavior. Although their potential harm is widely acknowledged, there remains no well-defined construct for characterizing the degree to which information-based threats influence changes in human judgments and decision-making, impeding theoretical advancement, measurement, and effective countermeasure development. Here, we introduce a human cognitive security construct focused on linking information-based threats to observable outcomes to bridge field-level definitions with operational measures by drawing from core mechanisms related to information processing and decision-making. To connect the information environment to behavior, we develop an integrative modeling framework that unifies Bayesian inference with affect-modulated decision valuation, capturing how cognitive resource allocation and affective valuation shape three core behavioral outcomes: veracity discernment, task-oriented actions, and information sharing. Through computational simulations, we demonstrate that this framework explains canonical phenomena, including cognitive heuristics, the illusory truth effect (R2=0.86, validated against empirical data), and incongruent veracity discernment and sharing behavior. We propose empirically grounded behavioral outcome measures of cognitive security to guide future empirical examinations. Finally, we outline how environment-specific elements, characterized by data availability and ecological constraints, affect individuals' cognitive security and identify future research directions.
Related papers
- MORPHEUS: A Multidimensional Framework for Modeling, Measuring, and Mitigating Human Factors in Cybersecurity [4.343339158263096]
This paper introduces MORPHEUS, a framework that operationalizes human-centric security as a dynamic and interconnected system.<n>It consolidates 50 human factors influencing susceptibility to major cyberthreats, including phishing, malware, password management, and misconfigurations.<n>MorPHEUS links theory to practice through an inventory of 99 validated psychometric instruments, enabling empirical assessment and targeted intervention.
arXiv Detail & Related papers (2025-12-20T10:27:37Z) - A Descriptive Model for Modelling Attacker Decision-Making in Cyber-Deception [0.0]
This paper presents a descriptive model that incorporates the psychological and strategic elements shaping this decision.<n>The framework provides a structured method for analysing engagement decisions in cyber-deception scenarios.
arXiv Detail & Related papers (2025-12-03T10:23:33Z) - AI Deception: Risks, Dynamics, and Controls [153.71048309527225]
This project provides a comprehensive and up-to-date overview of the AI deception field.<n>We identify a formal definition of AI deception, grounded in signaling theory from studies of animal deception.<n>We organize the landscape of AI deception research as a deception cycle, consisting of two key components: deception emergence and deception treatment.
arXiv Detail & Related papers (2025-11-27T16:56:04Z) - Decision-Making Amid Information-Based Threats in Sociotechnical Systems: A Review [0.0]
Technological systems increasingly mediate human information exchange, spanning interactions among humans as well as between humans and artificial agents.<n>This review synthesizes insights from both domains to identify shared cognitive mechanisms that mediate vulnerability to information-based threats and shape behavioral outcomes.<n>We outline directions for future research aimed at integrating these perspectives, emphasizing the importance of such integration for mitigating human vulnerabilities and aligning human-machine representations.
arXiv Detail & Related papers (2025-10-28T13:26:41Z) - Perception Graph for Cognitive Attack Reasoning in Augmented Reality [12.005631730339708]
We introduce a novel model designed to reason about human perception within augmented reality systems.<n>Our model operates by first mimicking the human process of interpreting key information from an MR environment.<n>We demonstrate how the model can compute a quantitative score that reflects the level of perception distortion.
arXiv Detail & Related papers (2025-08-30T20:48:32Z) - When Models Know More Than They Can Explain: Quantifying Knowledge Transfer in Human-AI Collaboration [79.69935257008467]
We introduce Knowledge Integration and Transfer Evaluation (KITE), a conceptual and experimental framework for Human-AI knowledge transfer capabilities.<n>We conduct the first large-scale human study (N=118) explicitly designed to measure it.<n>In our two-phase setup, humans first ideate with an AI on problem-solving strategies, then independently implement solutions, isolating model explanations' influence on human understanding.
arXiv Detail & Related papers (2025-06-05T20:48:16Z) - Dynamic Programming Techniques for Enhancing Cognitive Representation in Knowledge Tracing [125.75923987618977]
We propose the Cognitive Representation Dynamic Programming based Knowledge Tracing (CRDP-KT) model.<n>It is a dynamic programming algorithm to optimize cognitive representations based on the difficulty of the questions and the performance intervals between them.<n>It provides more accurate and systematic input features for subsequent model training, thereby minimizing distortion in the simulation of cognitive states.
arXiv Detail & Related papers (2025-06-03T14:44:48Z) - Data Fusion for Partial Identification of Causal Effects [62.56890808004615]
We propose a novel partial identification framework that enables researchers to answer key questions.<n>Is the causal effect positive or negative? and How severe must assumption violations be to overturn this conclusion?<n>We apply our framework to the Project STAR study, which investigates the effect of classroom size on students' third-grade standardized test performance.
arXiv Detail & Related papers (2025-05-30T07:13:01Z) - Decoding Susceptibility: Modeling Misbelief to Misinformation Through a Computational Approach [61.04606493712002]
Susceptibility to misinformation describes the degree of belief in unverifiable claims that is not observable.
Existing susceptibility studies heavily rely on self-reported beliefs.
We propose a computational approach to model users' latent susceptibility levels.
arXiv Detail & Related papers (2023-11-16T07:22:56Z) - Explaining by Imitating: Understanding Decisions by Interpretable Policy
Learning [72.80902932543474]
Understanding human behavior from observed data is critical for transparency and accountability in decision-making.
Consider real-world settings such as healthcare, in which modeling a decision-maker's policy is challenging.
We propose a data-driven representation of decision-making behavior that inheres transparency by design, accommodates partial observability, and operates completely offline.
arXiv Detail & Related papers (2023-10-28T13:06:14Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.