A Study on the Concept of Cyber Cognitive Warfare and Case Study Methodology From a Psychological Perspective
DOI:
https://doi.org/10.34190/eccws.24.1.3553Keywords:
Cybercognitive warfare, Human vulnerabilities, Psychology, Methodological study, Psychology warfareAbstract
Cyber cognitive warfare, which manipulates the opponent's cognition to change behavior in inter-state warfare, is
emerging as an important element with the advancement of science and technology. Human behavior is based on psychology,
and psychology provides scientific grounds for cyber cognitive warfare, but existing cyber cognitive warfare studies have only
determined the cause of behavior as cognitive manipulation, and there is no research interpreting it from a psychological
perspective. Therefore, this paper presents a methodology that can explain the characteristics of cyber cognitive warfare
from a psychological perspective and the mechanism by which behavior is changed through cognitive manipulation using
Skinner's operant conditioning theory, a behavioral psychology. Skinner's operant conditioning theory is a theory that
intentionally changes and reinforces behavior, and as it is a theory that has been proven to change behavior through various
experimental results, we applied it to cases of inter-state cyber cognitive warfare such as the Russia-Ukraine War and
interpreted the mechanism by which behavior is changed. In addition, in the process of interpreting the behavior change
mechanism, we presented a control variable management plan based on the research results that behavioral results can vary
depending on the influence of control variables such as the intervention of a third country. In conclusion, this study is
expected to serve as a foundation for scientifically identifying the causes of behavioral changes through a case study
methodology of cyber cognitive warfare from a psychological perspective, as cyber cognitive warfare is inherently invisible,
gradually permeates the target, and by the time the impact is recognized, it is often too late to respond.
Downloads
Published
Issue
Section
License
Copyright (c) 2025 European Conference on Cyber Warfare and Security

This work is licensed under a Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International License.