<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Publishing DTD v1.3 20210610//EN" "JATS-journalpublishing1-3-mathml3.dtd">
<article xml:lang="EN" xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink" xmlns:ali="http://www.niso.org/schemas/ali/1.0/" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" dtd-version="1.3" article-type="review-article">
<front>
<journal-meta>
<journal-id journal-id-type="publisher-id">Front. Psychol.</journal-id>
<journal-title-group>
<journal-title>Frontiers in Psychology</journal-title>
<abbrev-journal-title abbrev-type="pubmed">Front. Psychol.</abbrev-journal-title>
</journal-title-group>
<issn pub-type="epub">1664-1078</issn>
<publisher>
<publisher-name>Frontiers Media S.A.</publisher-name>
</publisher>
</journal-meta>
<article-meta>
<article-id pub-id-type="doi">10.3389/fpsyg.2026.1751406</article-id>
<article-version article-version-type="Version of Record" vocab="NISO-RP-8-2008"/>
<article-categories>
<subj-group subj-group-type="heading">
<subject>Conceptual Analysis</subject>
</subj-group>
</article-categories>
<title-group>
<article-title>Emotionally based strategic communications as a new tool in defensive cognitive warfare</article-title>
</title-group>
<contrib-group>
<contrib contrib-type="author" corresp="yes">
<name><surname>&#x00106;osi&#x00107;</surname> <given-names>Kre&#x00161;imir</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<xref ref-type="corresp" rid="c001"><sup>&#x0002A;</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; original draft" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-original-draft/">Writing &#x2013; original draft</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x00026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<uri xlink:href="https://loop.frontiersin.org/people/3257720"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Popovi&#x00107;</surname> <given-names>Sini&#x00161;a</given-names></name>
<xref ref-type="aff" rid="aff1"><sup>1</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Visualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/visualization/">Visualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Methodology" vocab-term-identifier="https://credit.niso.org/contributor-roles/methodology/">Methodology</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Conceptualization" vocab-term-identifier="https://credit.niso.org/contributor-roles/conceptualization/">Conceptualization</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x00026; editing</role>
<uri xlink:href="https://loop.frontiersin.org/people/1315261"/>
</contrib>
<contrib contrib-type="author">
<name><surname>Wiederhold</surname> <given-names>Brenda</given-names></name>
<xref ref-type="aff" rid="aff2"><sup>2</sup></xref>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Supervision" vocab-term-identifier="https://credit.niso.org/contributor-roles/supervision/">Supervision</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Writing &#x2013; review &amp; editing" vocab-term-identifier="https://credit.niso.org/contributor-roles/writing-review-editing/">Writing &#x2013; review &#x00026; editing</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Validation" vocab-term-identifier="https://credit.niso.org/contributor-roles/validation/">Validation</role>
<role vocab="credit" vocab-identifier="https://credit.niso.org/" vocab-term="Investigation" vocab-term-identifier="https://credit.niso.org/contributor-roles/investigation/">Investigation</role>
<uri xlink:href="https://loop.frontiersin.org/people/229102"/>
</contrib>
</contrib-group>
<aff id="aff1"><label>1</label><institution>University of Zagreb Faculty of Electrical Engineering and Computing</institution>, <city>Zagreb</city>, <country country="hr">Croatia</country></aff>
<aff id="aff2"><label>2</label><institution>Virtual Reality Medical Center</institution>, <city>San Diego, CA</city>, <country country="us">United States</country></aff>
<author-notes>
<corresp id="c001"><label>&#x0002A;</label>Correspondence: Kre&#x00161;imir Cosic, <email xlink:href="mailto:kresimir.cosic@fer.hr">kresimir.cosic@fer.hr</email></corresp>
</author-notes>
<pub-date publication-format="electronic" date-type="pub" iso-8601-date="2026-02-06">
<day>06</day>
<month>02</month>
<year>2026</year>
</pub-date>
<pub-date publication-format="electronic" date-type="collection">
<year>2026</year>
</pub-date>
<volume>17</volume>
<elocation-id>1751406</elocation-id>
<history>
<date date-type="received">
<day>21</day>
<month>11</month>
<year>2025</year>
</date>
<date date-type="rev-recd">
<day>01</day>
<month>01</month>
<year>2026</year>
</date>
<date date-type="accepted">
<day>14</day>
<month>01</month>
<year>2026</year>
</date>
</history>
<permissions>
<copyright-statement>Copyright &#x000A9; 2026 &#x00106;osi&#x00107;, Popovi&#x00107; and Wiederhold.</copyright-statement>
<copyright-year>2026</copyright-year>
<copyright-holder>&#x00106;osi&#x00107;, Popovi&#x00107; and Wiederhold</copyright-holder>
<license>
<ali:license_ref start_date="2026-02-06">https://creativecommons.org/licenses/by/4.0/</ali:license_ref>
<license-p>This is an open-access article distributed under the terms of the <ext-link ext-link-type="uri" xlink:href="https://creativecommons.org/licenses/by/4.0/">Creative Commons Attribution License (CC BY)</ext-link>. The use, distribution or reproduction in other forums is permitted, provided the original author(s) and the copyright owner(s) are credited and that the original publication in this journal is cited, in accordance with accepted academic practice. No use, distribution or reproduction is permitted which does not comply with these terms.</license-p>
</license>
</permissions>
<abstract>
<p>In modern cognitive warfare, adversaries deliberately target human cognition, emotion, belief, trust, and decision-making processes, seeking to destabilize democratic societies through disinformation and divergent media campaigns. This article argues that the growing accessibility and vulnerability of the human emotional brain to external influence in a technologically connected world has important repercussions for global defense and security strategy. Recent EU/NATO strategic documents emphasize the need to strengthen resilience, counter hybrid/cognitive threats, and protect societies against disinformation and manipulation. Resilience to cognitive warfare, however, depends on distributed societal capacities for emotional literacy, deliberation, and comprehension&#x02014;grounded in emotional and cognitive superiority, political culture, robust democratic institutions, and an informed public. Deep security crises and prolonged military conflicts arouse strong negative emotions among affected individuals, groups, and societies. Accordingly, this article proposes Emotionally Based Strategic Communications (EBSC) as a scientifically and ethically grounded approach for applying cognitive neuroscience and artificial intelligence (AI) to design emotionally resonant, legitimate, and strategically aligned communications, aiming to strengthen societal cohesion, counter adversary narratives, and build societal resilience against cognitive threats. EBSC provides tools for identifying and transforming dominant emotional states within target populations through the intentional design of structured multimodal narratives, language, imagery, and symbolic framing, with the aim of positively reconfiguring collective emotions without coercion. EBSC is conceptualized as a Large Language Model (LLM)&#x02013;based systematic approach to strategic communications, which senses the emotional climate of target populations via social-sentiment analysis algorithms applied to various open digital sources; interprets and contextualizes this emotional climate; conducts design and development of appropriate output messages; delivers these messages across mass media; assesses their impact; and adapts them in a real-time closed loop, under supervision of accountable human decision-makers. The article calls for integrating the proposed closed-loop, LLM-based EBSC approach into the European defense ecosystem and strategic communications policy, aligned with EU frameworks on resilience and counter-disinformation. Such integration may offer a means of bridging cognitive neuroscience and AI into operational, scientifically informed, and emotionally resonant strategic communications that counter adversary narratives, prepare the public to resist disinformation and psychological pressure, and strengthen trust, cohesion, and overall societal resilience among EU/NATO allies.</p></abstract>
<kwd-group>
<kwd>artificial intelligence</kwd>
<kwd>cognitive warfare</kwd>
<kwd>cognitive neuroscience</kwd>
<kwd>emotionally based strategic communications</kwd>
<kwd>European defense and security</kwd>
<kwd>large language model</kwd>
</kwd-group>
<funding-group>
<funding-statement>The author(s) declared that financial support was not received for this work and/or its publication.</funding-statement>
</funding-group>
<counts>
<fig-count count="2"/>
<table-count count="0"/>
<equation-count count="0"/>
<ref-count count="169"/>
<page-count count="15"/>
<word-count count="13267"/>
</counts>
<custom-meta-group>
<custom-meta>
<meta-name>section-at-acceptance</meta-name>
<meta-value>Neuropsychology</meta-value>
</custom-meta>
</custom-meta-group>
</article-meta>
</front>
<body>
<sec sec-type="intro" id="s1">
<label>1</label>
<title>Introduction</title>
<p>A comprehensive analysis of negative emotions&#x02014;their distribution, structure, and conditioning at the state level&#x02014;can provide deeper insight into the character of potential cognitive warfare and the risk of military aggression. A clearer understanding of defense and security challenges, as well as the complex, turbulent, and uncertain political environments surrounding them, can be achieved through mapping dominant emotional patterns that illustrate the mental and emotional states of affected populations. Therefore, emotion analysis should play an increasingly important role in international political and security analysis.</p>
<p>Augmenting political and security analyses with emotional considerations complements and enhances traditional rationality-based approaches, shifting from a purely rational framework toward a more integrative emotional-cognitive methodology (<xref ref-type="bibr" rid="B104">McDermott, 2004</xref>; <xref ref-type="bibr" rid="B107">Mercer, 2010</xref>; <xref ref-type="bibr" rid="B37">Crawford, 2014</xref>; <xref ref-type="bibr" rid="B70">Hall and Ross, 2015</xref>; <xref ref-type="bibr" rid="B92">Lerner et al., 2015</xref>). Long-lasting wars, severe security crises, and deep military conflicts arouse strong negative emotions among directly affected individuals, groups, and societies (<xref ref-type="bibr" rid="B36">Crawford, 2000</xref>; <xref ref-type="bibr" rid="B10">Bar-Tal, 2001</xref>; <xref ref-type="bibr" rid="B11">Bar-Tal et al., 2007</xref>; <xref ref-type="bibr" rid="B84">Jarymowicz and Bar-Tal, 2006</xref>; <xref ref-type="bibr" rid="B97">Lindner, 2009</xref>). Without understanding the influence of emotions&#x02014;which shape the behavior of war-affected societies far more than these societies can control them&#x02014;it is impossible to understand the political, psychological, and emotional aspects of any conflict.</p>
<p>For example, the protracted war in Ukraine is characterized by daily fighting, shelling, bombing, drone attacks, property destruction, violations of civil infrastructure, and inflammatory narratives. These conditions strongly affect the emotional experiences of the local population, generating a dramatic socio-political and emotional context (<xref ref-type="bibr" rid="B96">Limaj et al., 2024</xref>; <xref ref-type="bibr" rid="B140">Scharbert et al., 2024</xref>).</p>
<p>Today, unlike conventional kinetic warfare, cognitive warfare intentionally targets human cognition and performance&#x02014;specifically, belief systems, social trust, collective attitudes, and political and institutional decision-making. The influence of cognitive warfare will be further empowered by advances in cognitive neuroscience and artificial intelligence (AI). This article argues that understanding the human emotional brain as increasingly vulnerable to external influence in a technologically interconnected world fundamentally reshapes contemporary defense and security strategy.</p>
<p>Cognitive warfare leverages psychological manipulation, disinformation, memetic engineering, and algorithmic influence to disrupt coherent sense-making within societies (<xref ref-type="bibr" rid="B47">du Cluzel, 2021</xref>; <xref ref-type="bibr" rid="B26">Claverie and du Cluzel, 2022</xref>; <xref ref-type="bibr" rid="B45">Deppe and Schaal, 2024</xref>; <xref ref-type="bibr" rid="B101">Marjanovi&#x00107; and Smiljani&#x00107;, 2025</xref>). Adversaries exploit affective vulnerabilities by engineering doubt, inducing moral fatigue, and triggering emotionally charged divisions across cultural, national, and political lines. The goal is not military destruction, but erosion of legitimacy, paralysis of decision-making, and weakening of social cohesion through AI-driven mechanisms.</p>
<p>Political leaders may underestimate the complexity and persistence of these emotional and psychological dynamics. Strong negative emotions&#x02014;fear, humiliation, anger, hatred&#x02014;can entrench group mentalities and significantly delay conflict resolution. Research in political psychology shows that negative emotional framing strongly influences public attitudes toward war, refugees, minority rights, and authoritarianism (<xref ref-type="bibr" rid="B99">Marcus et al., 2000</xref>; <xref ref-type="bibr" rid="B98">Lodge and Taber, 2013</xref>).</p>
<p>Emotionally Based Strategic Communications (EBSC; <xref ref-type="bibr" rid="B33">Cosi&#x00107; et al., 2011</xref>, <xref ref-type="bibr" rid="B34">2012a</xref>,<xref ref-type="bibr" rid="B35">b</xref>, <xref ref-type="bibr" rid="B31">2013</xref>, <xref ref-type="bibr" rid="B32">2018</xref>), as proposed in this article, offers a structured method for applying cognitive neuroscience and AI within emotionally resonant, legitimate, and strategically aligned communications. It may strengthen societal cohesion, counter adversary narratives, and build societal resilience against hybrid threats. In an operational life cycle, EBSC should function as a Large Language Model (LLM) that senses the emotional climate of a targeted population via social-sentiment analysis, interprets this context, designs and develops EBSC messages, disseminates them through mass media, evaluates their impact, and adapts them in a real-time closed loop. EBSC thus provides a repeatable, ethically grounded framework for operating in the cognitive domain, ensuring that communications are scientifically informed, strategically consistent, and effective in reinforcing European resilience and unity.</p>
<p>The current contribution represents a novel avenue of application and refinement of the original concept of EBSC and dominant emotional maps, which were initially conceived by the first author nearly 20 years ago during five visits to Afghanistan as a representative of NATO Parliamentary Assembly. These concepts were explored in earlier publications in relation to extreme political attitudes, societal stress-related disorders, and processes of societal deradicalization (<xref ref-type="bibr" rid="B33">Cosi&#x00107; et al., 2011</xref>, <xref ref-type="bibr" rid="B34">2012a</xref>,<xref ref-type="bibr" rid="B35">b</xref>, <xref ref-type="bibr" rid="B31">2013</xref>, <xref ref-type="bibr" rid="B32">2018</xref>). Based on these published articles as foundation, the authors made selection and integration of relevant literature to recontextualize the EBSC framework for contemporary defensive cognitive warfare.</p></sec>
<sec id="s2">
<label>2</label>
<title>The importance of emotion analyses in cognitive warfare</title>
<p>Emotions strongly influence human cognition, decision-making, and behavior (<xref ref-type="bibr" rid="B92">Lerner et al., 2015</xref>), particularly during and after prolonged military conflicts (<xref ref-type="bibr" rid="B33">Cosi&#x00107; et al., 2011</xref>, <xref ref-type="bibr" rid="B34">2012a</xref>; <xref ref-type="bibr" rid="B72">Halperin et al., 2011</xref>; <xref ref-type="bibr" rid="B71">Halperin, 2014</xref>). Emotional arousal is not a side effect of conflict; it is often its core mechanism. The emotional contexts of war zones and war-affected societies&#x02014;characterized by fear, anger, desperation, humiliation, pessimism, hopelessness, hatred, rage, frustration, and resentment&#x02014;are not merely consequences of violence. They can also drive its persistence, prolong conflict, and complicate post-conflict resolution. The unchecked flow of such negative emotions increases insecurity and can make peace nearly uncontrollable.</p>
<p>Understanding the impact of these emotions on critical cognitive states and operational capabilities&#x02014;such as situational awareness, attention, and decision-making&#x02014;is therefore essential. Strong negative emotions can shape public narratives in ways that make wars more difficult to end than to prevent (<xref ref-type="bibr" rid="B34">Cosi&#x00107; et al., 2012a</xref>, <xref ref-type="bibr" rid="B32">2018</xref>). Unregulated emotional escalation can render peace processes nearly impossible. When political leaders fail to recognize these dynamics, they may unintentionally reinforce emotional inertia and undermine prospects for sustainable peace. Thus, it is crucial to understand the emotional complexity of any military conflict, as these emotional forces often stand as obstacles to long-term peace.</p>
<p>Desire for revenge, deep anxiety resulting from violent and protracted wars, and pervasive distrust can reduce a population&#x00027;s receptivity to peacebuilding (<xref ref-type="bibr" rid="B36">Crawford, 2000</xref>). Prolonged conflict and traumatic events exert substantial influence on the emotional climate, amplifying extreme political attitudes and reigniting cycles of violence, anxiety, and distrust within the local population (<xref ref-type="bibr" rid="B18">Canetti et al., 2017</xref>; <xref ref-type="bibr" rid="B76">Hetherington and Suhay, 2011</xref>; <xref ref-type="bibr" rid="B69">Hall and Werner, 2022</xref>; <xref ref-type="bibr" rid="B78">Hong and Kang, 2017</xref>). Stress, fear, and cognitive overload impair executive functioning and diminish self-reflective capacity (<xref ref-type="bibr" rid="B85">Jiang and Rau, 2017</xref>; <xref ref-type="bibr" rid="B145">Shields et al., 2016</xref>; <xref ref-type="bibr" rid="B4">Arnsten, 2009</xref>), shifting responses toward reactive, symbolic, or populist tendencies rather than strategic and evidence-informed decision-making.</p>
<p>Without cognitive and self-reflective capacities among leaders, emotional escalation can become systemic, with media and institutional actors unintentionally reinforcing adversarial framings (<xref ref-type="bibr" rid="B13">Baum and Groeling, 2009</xref>; <xref ref-type="bibr" rid="B164">Wolfsfeld, 2004</xref>; <xref ref-type="bibr" rid="B125">Plowman and Walton, 2020</xref>). The increasing prominence of cognitive warfare requires reevaluating not only how military personnel are trained and supported, but also how political and institutional decision-makers understand, respond to, and shape complex emotional and perceptual environments.</p>
<p>Rather than replace human cognition, AI must be designed to enhance it, especially in complex operational environments where human judgment, empathy, and ethics remain irreplaceable. Cognitive assistants that support military decision-making by offering diverse perspectives, highlighting biases, and suggesting reappraisal strategies may prove extremely valuable. Integrating cognitive neuroscience and AI into such areas will require new forms of training, ethical frameworks, and institutional structures. Yet the potential benefits are substantial: a defense and security system that is not only smarter and faster, but also more adaptive, resilient, and humane.</p>
<p>Cognitive sovereignty refers to the ability of individuals, societies, and political systems to maintain control over their attention, judgment, emotion, and memory, even amid psychological and informational warfare. In an age of neural targeting, digital overload, and AI-accelerated persuasion, cognitive sovereignty must be treated as both a strategic resource and a fundamental human right. Protecting citizens from AI-enhanced disinformation or neuro-targeted manipulation&#x02014;including technologies designed to influence emotional states in security contexts&#x02014;is essential for increasing cognitive resilience. Resilience to cognitive warfare also requires a distributed capacity for emotional literacy, not only among elites but throughout democratic institutions, media and public, fostering deliberation rather than polarization, and comprehension rather than outrage.</p>
<p>In <italic>Mind Wars</italic>, <xref ref-type="bibr" rid="B111">Moreno (2012)</xref> raised early concerns about the potential military and national-security applications of neuroscience, highlighting the work by Defense Advanced Research Projects Agency (DARPA), and warning about technologies that could influence soldiers&#x00027; memory, cognition, emotions, behavior, and mental capacities. Since the 1990s, when the U.S. National Academy of Sciences began mapping neural and anatomical brain connections, as well as exploring molecular and genetic mechanisms underlying brain function [<xref ref-type="bibr" rid="B82">Institute of Medicine (U.S.) Committee on a National Neural Circuitry Database, 1991</xref>; <xref ref-type="bibr" rid="B103">McCreight, 2024</xref>], scientific knowledge related to brain dynamics, neuronal plasticity, dendritic and synaptic interactions, neural wiring diagrams, and firing patterns associated with particular emotional or cognitive states has grown dramatically. However, this dual-use research carries risks, because neuroscience may be weaponized to degrade or impair human cognitive functions and operational neural capabilities through hostile neuromodulation (<xref ref-type="bibr" rid="B103">McCreight, 2024</xref>).</p>
<p>The EBSC approach (<xref ref-type="bibr" rid="B34">Cosi&#x00107; et al., 2012a</xref>, <xref ref-type="bibr" rid="B32">2018</xref>), as presented in this article, focuses on protecting human limbic networks from hostile cognitive warfare operations that may have long-term negative impacts on reasoning and behavior. NATO&#x00027;s <italic>Strategic Concept 2022</italic> (<xref ref-type="bibr" rid="B115">NATO, 2022</xref>) and the EU&#x00027;s <italic>Strategic Compass 2022</italic> (<xref ref-type="bibr" rid="B54">EU, 2022</xref>) identify the cognitive domain as an emerging arena of contestation. Both organizations emphasize the importance of resilience, countering hybrid threats, and protecting societies against disinformation and manipulation (<xref ref-type="bibr" rid="B49">East StratCom Task Force, n.d.</xref>; <xref ref-type="bibr" rid="B56">European Digital Media Observatory, n.d.</xref>). Within this evolving politico-military landscape, EBSC offers a structured method for bridging cognitive neuroscience and AI into operational strategic communications, thereby strengthening alliance cohesion and societal resilience.</p></sec>
<sec id="s3">
<label>3</label>
<title>Emotionally based strategic communications</title>
<p>EBSC grounded in emotion recognition, affective resonance, narrative framing, and emotional influence can support defensive operations in the context of cognitive warfare. Aggregating the dominant emotions of individual members of a population in a given region of interest can capture the main sentiments and feelings perceived by participants and observers as most prominent in an episode of collective behavior. Relevant information for assessing collective sentiments and feelings can be monitored across various open digital communication sources, such as public social network channels, forums, and video-sharing platforms (Facebook, X, Reddit, YouTube, etc.), as well as portals, blogs, and news outlets.</p>
<p>Dominant emotional maps can be regarded as representations of the collective emotional climate and orientations of a population under consideration, providing insight into the distribution of emotions within the targeted group. These dominant emotional maps and emotional contexts can be changed or shaped through the EBSC concept, which extends and refines traditional strategic communications.</p>
<p>Strategic communications&#x02014;aimed at influencing perceptions, attitudes, beliefs, and behaviors of a targeted audience toward a desirable end state&#x02014;should explicitly integrate emotional factors, consistent with James A. Treadwell&#x00027;s statement: &#x0201C;If you want to influence someone, you have to touch their emotions&#x0201D; (<xref ref-type="bibr" rid="B108">Merle, 2005</xref>). Influencing people without engaging their emotions is almost impossible. Interpreted within a broader social and cultural environment, strategic communications that incorporate an emotionally based strategy may play a more important role in conflict management, making traditional approaches more influential and effective.</p>
<p>The goal of EBSC is to influence the emotions of a critical mass of members within the targeted group such that the collective emotional climate and orientation gradually shift from predominantly negative to more positive. The credibility of EBSC messages should be enhanced by focusing their narrative content on real issues and challenges on the ground and on the quality of life of the local population. Sustained delivery of EBSC messages centered on real, on-the-ground problems may contribute to the transformation of dominant emotional maps. Each successful EBSC campaign focused on a targeted population may provide an opportunity for a &#x0201C;tipping point&#x0201D; (<xref ref-type="bibr" rid="B64">Gladwell, 2000</xref>) in the underlying non-linear emotional dynamics, shifting the center of gravity of the dominant emotional map toward the valence&#x02013;arousal quadrant associated with a positive collective emotional orientation. In defense and security contexts, EBSC are based on the design of multimodal emotional, narrative, visual, linguistic, and symbolic cues, with the objective of influencing and transforming the emotional states of the targeted population in a more positive direction.</p>
<p>Neurocognitive science, enhanced by AI, provides tools and methods for shaping communication strategies rooted in emotional resonance and credibility, to augment and reinforce positive public opinion and morale. Applications include counter-disinformation, deterrence, conflict de-escalation, public relations, and strengthening democratic trust.</p>
<p>In today&#x00027;s information-dense and emotionally charged strategic environment, the ability to shape affective dynamics is as critical as controlling physical terrain through kinetic power. EBSC offers a science-based framework for understanding and influencing the emotional drivers of perception, behavior, and decision-making in both military and civilian domains. Its strategic value is inherently dual-use, as it can enhance defense communications, reinforce operational capabilities and human morale, prevent radicalization, and build democratic resilience to psychological threats and cognitive warfare.</p>
<p>In modern hybrid and cognitive warfare environments, the ability to modulate affective dynamics is as strategically important as kinetic or cyber capabilities. The EBSC approach provides a science-based framework against adversary strategic influence campaigns by eliciting desirable emotional and behavioral responses that guide defensive decision-making processes in both military and civilian audiences, using narrative structure, language, imagery, and symbolic content. The goal is to increase the defensive robustness of emotional responses against disturbances generated by adversarial psychological operations, thereby securing internal cohesion and morale within the targeted population, as well as resilience to psychological and cognitive manipulation.</p>
<p>Integrating EBSC into defense strategy requires new capabilities and new AI-driven tools, such as the use of LLMs in group sentiment analysis, affective forecasting, and real-time assessment of the impact of emotionally resonant narratives on targeted populations. Combined with neuroscientific insights into affective processing, these tools can help identify which affective narratives and messages promote positive, adaptive emotional regulation, social cohesion, and threat awareness&#x02014;without inciting panic or antagonism.</p>
<p>As such, EBSC should be embedded not only in defense communications and strategic planning, but also in civil preparedness, diplomacy, and political leadership training. Using these tools, Europe can move from reactive messaging toward emotionally informed, cognitively resilient governance. By anticipating how populations emotionally interpret ambiguous or contradictory information, EBSC leaders can design interventions that build cognitive immunity against disinformation, psychological destabilization, and societal polarization.</p>
<p>These methods are particularly relevant for contemporary European security, where adversaries exploit digital platforms not only to mislead, but also to manipulate emotional states in ways that undermine institutional trust. EBSC supported by AI can strengthen the cognitive mechanisms underpinning decision-making in defense and security strategic communication contexts. It may provide ontologically structured, scientifically grounded methods for designing emotionally resonant and cognitively effective narratives.</p>
<p>The concept of EBSC is presented in this article as a structured, scientifically grounded framework that links emotion-cognition dynamics with strategic communication in defense and security affairs. It is a conceptual and methodological framework that integrates insights from cognitive neuroscience, the psychology of emotion, and strategic communication studies to enhance the effectiveness of influence, persuasion, and resilience-building in complex defense and security environments. EBSC provides a structured, operationalizable approach that explicitly links emotional processes with cognitive mechanisms of decision-making, enabling the design of communications that are both scientifically grounded and strategically targeted.</p>
<p>While traditional psychological operations (PSYOPS) are military or government-planned communications intended to influence foreign audiences&#x00027; emotions, attitudes, reasoning, and behavior in support of strategic objectives (<xref ref-type="bibr" rid="B156">Wallenius and Nilsson, 2019</xref>; <xref ref-type="bibr" rid="B114">Narula, 2004</xref>), EBSC places much greater emphasis on the limbic structures of the human brain. Drawing on state-of-the-art neuroscience research (<xref ref-type="bibr" rid="B90">LeDoux, 1996</xref>; <xref ref-type="bibr" rid="B86">Jost and Amodio, 2012</xref>; <xref ref-type="bibr" rid="B138">Salzman and Fusi, 2010</xref>; <xref ref-type="bibr" rid="B120">Oxley et al., 2008</xref>), EBSC seeks to design messages that emotionally resonate with targeted populations and their local cultural backgrounds, thereby making messages more impactful on human emotion, cognition, and behavior (<xref ref-type="bibr" rid="B34">Cosi&#x00107; et al., 2012a</xref>, <xref ref-type="bibr" rid="B32">2018</xref>).</p>
<p>Emotionally anchored narratives can circumvent purely rational resistance, as decisions under conditions of stress or threat are often made emotionally first. This makes EBSC a powerful amplifier in defensive disinformation campaigns, deterrence messaging, and alliance-building. EBSC can be paired with AI-driven sentiment analysis and neurocognitive models to predict how targeted populations exposed to aggressive cognitive warfare might respond to specific triggers. It can enhance defensive emotional regulation within groups, creating shared positive emotional states that counter fear, radicalization, and distrust.</p>
<p>By steering emotional climates, EBSC can reinforce alliance cohesion, strengthen resilience against adversary influence, and inoculate populations with emotionally resonant counter-narratives that build trust in institutions. Finally, EBSC offers a structured, transparent, and ethical approach in democratic contexts, enhancing trust, promoting unity, and reducing susceptibility to hostile influence.</p></sec>
<sec id="s4">
<label>4</label>
<title>Transforming dominant emotional maps through emotionally based strategic communications</title>
<p>Narrative engineering based on generative AI (<xref ref-type="bibr" rid="B41">DeBuse, 2024</xref>; <xref ref-type="bibr" rid="B21">Chan, 2025a</xref>,<xref ref-type="bibr" rid="B22">b</xref>) will be capable of constructing and delivering messages that resonate emotionally while guiding cognitive interpretations toward desired political, defense, and security outcomes. EBSC enables strategic transitions from reactive emotional states to cooperative, resilient states through deliberate narrative design. This is particularly critical for countering adversarial influence campaigns that exploit emotional vulnerabilities through misinformation and polarization.</p>
<p>The evolving nature of modern warfare and security challenges demands a transformation in how defense capabilities are conceived, developed, and deployed. EBSC provides tools for identifying and transforming dominant emotional states. Through intentional narrative design, communicators can support transitions from reactive, fear-based cognition to reflective and cooperative engagement. This is highly relevant in hybrid warfare environments, where adversaries aim to destabilize democratic societies by manipulating emotional vulnerabilities via disinformation and polarizing media campaigns.</p>
<p>EBSC leverages structured multimodal narratives&#x02014;integrating language, imagery, and symbolic framing&#x02014;to positively reconfigure collective emotional states without coercion. By incorporating neuroscience-informed insights into cognitive performance, perception, stress, and attention, and by combining these with adaptive and neuro-symbolic AI systems, EBSC enables the development of more robust, responsive, and ethically grounded defense solutions. This convergence may also contribute to the formation of a new European strategic decision-making ecosystem, one that leverages real-time monitoring of the targeted population&#x00027;s cognitive and emotional states, supported by AI and EBSC.</p>
<p>This article proposes a conceptual framework to guide policy research and outlines implications for European strategic autonomy, ethical governance, and cross-disciplinary innovation. While cognitive performance in operational settings is critical, the broader strategic environment increasingly hinges on emotional dynamics at societal and political levels. In an age of information saturation and psychological manipulation, EBSC emerges as a core tool for defending democratic stability and managing the emotional architecture of collective decision-making.</p>
<p>Emotional management in the form of EBSC as &#x0201C;soft power&#x0201D; is essential for stabilizing war-affected societies (<xref ref-type="bibr" rid="B34">Cosi&#x00107; et al., 2012a</xref>,<xref ref-type="bibr" rid="B35">b</xref>, <xref ref-type="bibr" rid="B32">2018</xref>). Assessing dominant emotional patterns among the populations of these societies is crucial for achieving and restoring peace, stability, and security. Once local dominant emotional maps, meanings, and interpretations are identified and understood, influencing the behavior of the local population becomes possible through a comprehensive EBSC policy.</p>
<p>The transformation of a negative dominant emotional map in a war-affected society into a desirable positive dominant emotional map&#x02014;facilitated by EBSC&#x02014;is illustrated in <xref ref-type="fig" rid="F1">Figure 1</xref>. Dominant emotional maps within the framework of EBSC are structurally embedded, collectively shared cognitive-affective statistical visualizations that determine how target audiences emotionally frame strategic war reality, thereby shaping perception, meaning attribution, legitimacy judgments, and decision predispositions prior to and during exposure to strategic communication. They are displayed as histograms showing the distribution of emotions experienced by all individuals in a society or a group of interest at a particular time, enabling visual identification of the most frequently experienced, dominant emotions. The negative dominant emotional map of the war-affected society, illustrated in the left part of <xref ref-type="fig" rid="F1">Figure 1</xref>, is characterized by the predominance of trauma-induced negative discrete emotions such as fear, anger, humiliation, sadness, and frustration (<xref ref-type="bibr" rid="B51">Ekman, 1992</xref>; <xref ref-type="bibr" rid="B136">Roseman, 1991</xref>; <xref ref-type="bibr" rid="B44">Demszky et al., 2020</xref>), which occupy unpleasant/high-arousal region in the valence&#x02013;arousal space of dimensional emotion models (<xref ref-type="bibr" rid="B137">Russell, 1980</xref>; <xref ref-type="bibr" rid="B8">Barrett, 1998</xref>; <xref ref-type="bibr" rid="B127">Posner et al., 2005</xref>; <xref ref-type="bibr" rid="B17">Buechel and Hahn, 2017</xref>). Physiological and cognitive-behavioral signatures associated with these emotions include activation of hypothalamic-pituitary-adrenal axis, structural remodeling in the prefrontal cortex, heightened aggression, reduced pro-social behavior, susceptibility to misinformation and even violent extremism (<xref ref-type="bibr" rid="B105">McEwen and Morrison, 2013</xref>; <xref ref-type="bibr" rid="B27">Cohen, 1980</xref>; <xref ref-type="bibr" rid="B102">Martel et al., 2020</xref>; <xref ref-type="bibr" rid="B110">Mohammed and Neuner, 2022</xref>; <xref ref-type="bibr" rid="B94">Lewis et al., 2024</xref>).</p>
<fig position="float" id="F1">
<label>Figure 1</label>
<caption><p>Transformation of dominant emotional maps by EBSC (<xref ref-type="bibr" rid="B33">Cosi&#x00107; et al., 2011</xref>, <xref ref-type="bibr" rid="B34">2012a</xref>).</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyg-17-1751406-g0001.tif">
<alt-text content-type="machine-generated">3D surface plots depicting frequency distributions of individual emotions in a war-affected society are shown in valence-arousal space. The left plot represents dominance of negative emotions, characterized by lower pleasantness and high arousal, and the right plot represents dominance of more pleasant, lower arousing emotions. Both plots have axes labeled arousal and valence, with a marked center of gravity (CoG). An arrow called EBSC indicates a transformation from the left to the right 3D surface plot taking place over time through a sequence of positive tipping points. </alt-text>
</graphic>
</fig>
<p>The ultimate goal is to shift the emotions of a critical mass of individuals within the war-affected society so that, through a series of tipping points, the dominant emotional map begins converging toward the desirable end state, illustrated by the map in the right part of <xref ref-type="fig" rid="F1">Figure 1</xref>. This end state is characterized by positive emotions dominating in dimensional valence&#x02013;arousal space and discrete emotion space (hope, optimism, satisfaction, calmness, etc.), as well as by cognitive-behavioral signatures such as critical thinking and fact-checking, productive citizenship, adherence to social order and norms, and support for other pro-social values. For example, peacebuilding radio drama communications in post-genocide Rwanda were shown to shift perceived social norms and behaviors relevant to intergroup tolerance and reconciliation, increasing willingness to express independent thought, as well as impacting constructive communal problem-solving and dispute resolution (<xref ref-type="bibr" rid="B123">Paluck and Green, 2009</xref>; <xref ref-type="bibr" rid="B122">Paluck, 2009</xref>).</p>
<p>Transformation of the dominant emotional map through EBSC (<xref ref-type="fig" rid="F1">Figure 1</xref>) should result in a controllable trajectory of the map&#x00027;s Center of Gravity (CoG)&#x02014;representing the average valence&#x02013;arousal values of individual emotions in the targeted group or society&#x02014;moving from the unpleasant, high-arousal region toward the pleasant, lower-arousal region of the valence&#x02013;arousal space.</p>
<p>Successful transformation of dominant emotional maps depends on coordinated efforts among political decision-makers, the international community, and the transformational potential of the entire society or specific target groups within highly fragmented societies. It is important to emphasize that EBSC is not a panacea for all societal problems exploited and amplified by adversarial cognitive warfare propaganda. Its chances of success are limited if implementation efforts are not accompanied by simultaneous economic, political, security, and institution-building measures. Only when embedded within these broader processes can strategic emotional management via EBSC contribute meaningfully to societal transformation.</p>
<p>The objective of EBSC is to deliver semantically and emotionally appropriate multimedia stimuli, drawn from specifically designed emotional databases, to a targeted group or nation experiencing cognitive warfare aggression. Based on comparative analysis between the delivered semantically and emotionally annotated stimuli and their impact on the dominant emotional map of the targeted group, an adaptive emotional expert system supported by an LLM updates the stimulation strategy to strengthen the group&#x00027;s resilience against adversarial cognitive warfare. EBSC messages are cognitively interpreted by members of the targeted group within their specific historical, cultural, and political context.</p>
<p>The integration of emotional properties and narrative content within LLM-based EBSC must be designed with enough flexibility to emphasize the right issues at the right time (<xref ref-type="bibr" rid="B28">Corman and Dooley, 2008</xref>)&#x02014;strongly, effectively, and with full confidence and credibility&#x02014;serving, for example, as inoculation against imposed cognitive warfare. The most successful combinations of emotional properties and narrative content are those that embrace ideas and emotions capable of quickly gaining resonance with the targeted group. Narrative content should focus on real achievements, functional institutions, and credible economic results that are likely to be judged positively by the targeted group rather than perceived as controversial or negative.</p>
<p>However, public opinion is shaped not only by words but also by emotionally grounded perceptions. Therefore, when conveying information, it is essential to consider the culture, history, and traditions of intended audiences. Understanding and accounting for specific psychosocial mental complexes, socio-cultural and socio-political structures, and their interdependencies is crucial for designing effective EBSC messages directed at specific audiences. Relevant literature demonstrates gender- and age-related differences in self-estimated cognitive-emotional capacities and related psychological correlates (<xref ref-type="bibr" rid="B62">Giannouli, 2023</xref>), as well as emotional appraisal processes (<xref ref-type="bibr" rid="B147">Stella et al., 2022</xref>), underscoring the need for EBSC approaches to account for demographic and cross-cultural diversity rather than assuming homogeneous audience responses.</p>
<p>EBSC can be regarded as a &#x0201C;soft approach&#x0201D; to winning the hearts and minds of a targeted population, strengthening their reluctance to endorse hostile narratives and reinforcing their resistance to cognitive warfare directed against their emotional brains (<xref ref-type="bibr" rid="B90">LeDoux, 1996</xref>). In other words, EBSC can be viewed as a comprehensive process that produces and shapes &#x0201C;soft power&#x0201D; (<xref ref-type="bibr" rid="B116">Nye, 1990</xref>), offering a cost-effective complement to currently predominant &#x0201C;hard power&#x0201D; approaches. As such, EBSC may provide real added value as a form of soft power aimed at guiding a targeted population toward a more positive end state.</p>
<p>A well-designed EBSC approach&#x02014;implemented through credible and transparent public campaigns&#x02014;can induce vitally important positive emotions and a sense of efficacy, cultivating a genuine positive outlook among the targeted population while maintaining appropriate public vigilance during conflict situations (e.g., <xref ref-type="bibr" rid="B93">Lewandowsky and van der Linden, 2021</xref>; <xref ref-type="bibr" rid="B50">Ecker et al., 2022</xref>).</p></sec>
<sec id="s5">
<label>5</label>
<title>Emotionally based strategic communications as an LLM closed-loop transformer</title>
<p>The conceptual flow illustrating how EBSC should be embedded into cognitive warfare involves several stages: AI-based analysis of data to identify emotional and cognitive vulnerabilities; an EBSC transformer that translates these insights into emotionally precise influence strategies; narrative design that crafts and deploys strategic messaging; and a target audience that receives these messages and reacts at cognitive, emotional, and behavioral levels. Throughout this process, feedback loops measure resonance and adapt communications in real time. This creates a closed-loop system for the continuous optimization of influence in cognitive warfare, defending against adversary narratives by understanding how emotions shape cognition, behavior, and decision-making.</p>
<p>In defensive cognitive warfare, EBSC functions as a neuroscientifically grounded framework for narrative engineering (<xref ref-type="bibr" rid="B41">DeBuse, 2024</xref>), countering offensive narratives through positive, fact-based, emotion-adapted messaging. The convergence of cognitive neuroscience and AI embedded within EBSC may create a novel pathway for Europe to build adaptive, human-aligned, and ethically governed defense capabilities against offensive cognitive warfare. Embedding EBSC within defense training and education, public diplomacy, and crisis response ecosystems offers proactive tools for shaping emotionally stable strategic landscapes.</p>
<p>Real-time feedback loops based on emotion and sentiment analysis continuously and dynamically refine EBSC strategic messaging in a closed loop for optimal defensive impact. LLM-selected multimedia stimuli can be broadcast by radio, leaflets, television, and other traditional as well as digital dissemination channels, whose number continues to grow. In societies with low levels of technological development, however, mass media broadcasting alone cannot be assumed sufficient to induce positive change and must be complemented by person-to-person dissemination of messages at formal and informal meetings and other public gatherings.</p>
<p>EBSC as an LLM transformer can be interpreted, in the context of closed-loop systems theory, as a regulation&#x02014;similar to a proportional-integrative-derivative (PID) controller in a closed-loop system&#x02014;whose objective is to improve system performance in terms of stability, accuracy, and overall effectiveness. In the context of this article, regulation is related to mental states of targeted population such as cognition, emotion, and behavior, which are disturbed by adversarial kinetic or cognitive warfare aggression. Under dangerous, life-threatening circumstances, individuals may shift from a statistically normal distribution of emotions to a dominant emotional map characterized by fear, sadness, anger, and related states, which can contribute to depression, anxiety, PTSD, or even suicide.</p>
<p>Using a well-trained EBSC LLM transformer, emotionally charged inputs&#x02014;messages, sentiments, narratives, etc.&#x02014;can be systematically transformed into strategically framed output messages with the goal of preventing further degradation of the dominant emotional map of a targeted population. Emotional input mapping is based on collecting emotional content such as messages, texts, posts, speeches, and interviews. By applying emotion and sentiment analysis methods, the EBSC input layer classifies emotions (e.g., fear, anger, hope, grief) and places the results into a &#x0201C;dynamic emotional map&#x0201D; that models the targeted community&#x00027;s emotional state distribution over time and context.</p>
<p>The transformation methodology is grounded in these emotional inputs, which are mapped, processed, and reframed positively to support resilience, empathy, and stability in communications with the targeted population. Rather than amplifying volatility, the EBSC process should acknowledge and validate underlying emotions that people need to have recognized. Reframing requires shifting negative valence into constructive orientations&#x02014;for example, fear into preparedness, anger into justice-seeking. It is important to avoid emotional overload by blending calming, hopeful, and practical tones, and by linking output narratives to shared values, identity, or positive collective memory. The following subsections outline how emotional input can be mapped, processed, and reframed constructively to support resilience, empathy, and stability in communications.</p>
<sec>
<label>5.1</label>
<title>LLM-based EBSC transformer as a three-stage filter</title>
<p>The LLM-Based EBSC Transformer can be viewed as a three-stage filter composed of three layers (<xref ref-type="fig" rid="F2">Figure 2</xref>).</p>
<fig position="float" id="F2">
<label>Figure 2</label>
<caption><p>Cognitive warfare defense strategy based on cognitive neuroscience, AI and EBSC.</p></caption>
<graphic mimetype="image" mime-subtype="tiff" xlink:href="fpsyg-17-1751406-g0002.tif">
<alt-text content-type="machine-generated">Flowchart depicting an LLM-Based EBSC Transformer system, which has three layers: Input Emotion Analysis, Strategic Transformation, and Output Communication. This system designs and delivers appropriate strategic communications output messages to cognitive and emotional brains of humans in the loop, mitigating their vulnerability to kinetic and cognitive warfare aggression. On input side, the system receives a difference between a referent peaceful steady state and the current cognitive and emotional state of humans in the loop, which is the basis for closed-loop generation of output messages. The system is under supervisory control of humans on the loop, who are accountable for delivered strategic communications.</alt-text>
</graphic>
</fig>
<sec>
<label>5.1.1</label>
<title>Input emotion analysis layer</title>
<p>This layer extracts keywords, emotional tendencies, intensity, and potential triggers in near real time (hourly or daily). It collects emotional messages (texts, posts, speeches, interviews) in natural language form from diverse open digital communication channels and sources such as public social networks (Facebook, X, etc.), forums (Reddit, Discord, etc.), video-sharing sites (YouTube, TikTok, etc.), Telegram channels, civic portals, blogs (e.g., WordPress), news sites, and broadcast transcripts. Sentiment analysis and emotion classification (<xref ref-type="bibr" rid="B74">Hasan et al., 2019</xref>; <xref ref-type="bibr" rid="B135">Rosado et al., 2022</xref>) are applied to generate a dynamic emotional map (<xref ref-type="bibr" rid="B34">Cosi&#x00107; et al., 2012a</xref>,<xref ref-type="bibr" rid="B35">b</xref>)&#x02014;a model of the community&#x00027;s emotional state distribution over time and topics, supplemented with geographic location.</p>
<p>This layer also tracks keywords; context/topic categories (e.g., energy, sanctions); narrative clusters within these categories (e.g., &#x0201C;energy costs are rising,&#x0201D; &#x0201C;intensify sanctions&#x0201D;); classified emotions according to valence&#x02013;arousal or discrete-emotion models (e.g., joy, fear, anger, hope, grief); identified positive and negative sentiments; frames (<xref ref-type="bibr" rid="B157">Wang et al., 2025</xref>) as interpretive lenses that give narratives their meaning (e.g., threat, injustice, betrayal, dignity, efficacy, fairness); and supporting or opposing stances (<xref ref-type="bibr" rid="B88">K&#x000FC;&#x000E7;&#x000FC;k and Can, 2020</xref>) toward specific institutions, actors, policies, themes, claims, or propositions. It further assigns cognitive warfare&#x02013;related labels such as bot likelihood (<xref ref-type="bibr" rid="B166">Yang et al., 2022</xref>), coordination signals (<xref ref-type="bibr" rid="B24">Cinelli et al., 2022</xref>), message toxicity (<xref ref-type="bibr" rid="B91">Lees et al., 2022</xref>), and misinformation content (<xref ref-type="bibr" rid="B83">Islam et al., 2020</xref>), and computes confidence/uncertainty estimates for these inferred constructs to facilitate decision-makers&#x00027; situational awareness.</p></sec>
<sec>
<label>5.1.2</label>
<title>Strategic transformation layer</title>
<p>This layer maps emotional inputs into constructive outputs&#x02014;for example, transforming fear-related wording into messages centered on preparedness, safety, and encouragement; anger into productive and fruitful action; sadness into solidarity; erosion of trust into hope; and joy into reinforcement and strength. Its primary focus is to validate underlying emotions, shift negative valence toward constructive orientations, and avoid emotional overload by incorporating calming, hopeful, and practical tones.</p>
<p>Through cyber text/speech and social sentiment analysis across EU/NATO audiences, this layer translates cognitive and affective inputs into output narrative design and strategy, while continuous assessment of effects drives real-time adaptation. Mechanisms in this layer include diversifying emotional usage (avoiding overreliance on fear or outrage); connecting narratives to shared values, identity, or positive collective memory, culture, and habits of the targeted population; and strategically injecting positive emotions such as hope, pride, and gratitude to stabilize negative dominant emotional maps.</p>
<p>Transforming emotional inputs into EBSC outputs involves cognitive reappraisal, reframing, and redirection while preserving emotional diversity, avoiding the dominance of destructive emotions, and maintaining social peace and stability, thereby crafting a more positive collective emotional climate. The strategic transformation layer receives information from input emotion analysis layer and analyzes dominant emotional maps, sentiments, cognitive biases, broader defense and security threats, and relevant social and environmental context.</p>
<p>This layer may also support mental preparedness and readiness in the targeted population by building resilience, inoculating against disinformation, and reinforcing trust in institutions. It can additionally contribute to mental health support (<xref ref-type="bibr" rid="B29">Cosic et al., 2024</xref>) by using the wording, language and principles of computerized cognitive-behavioral therapy (<xref ref-type="bibr" rid="B153">Vallury et al., 2015</xref>), stress inoculation training (<xref ref-type="bibr" rid="B162">Wiederhold and Wiederhold, 2010</xref>; <xref ref-type="bibr" rid="B106">Meichenbaum, 2017</xref>), stress exposure training (<xref ref-type="bibr" rid="B46">Driskell et al., 2018</xref>), mental readiness training (<xref ref-type="bibr" rid="B151">Thompson and McCreary, 2006</xref>), emotion regulation frameworks (<xref ref-type="bibr" rid="B16">Braunstein et al., 2017</xref>; <xref ref-type="bibr" rid="B129">Renna et al., 2017</xref>), cognitive restructuring (<xref ref-type="bibr" rid="B25">Clark, 2013</xref>), and mindfulness training (<xref ref-type="bibr" rid="B6">Baer, 2003</xref>; <xref ref-type="bibr" rid="B146">Stanley, 2014</xref>). Technology-supported training and monitoring can function as a form of &#x02018;stress vaccine,&#x00027; strengthening adaptive coping responses before exposure to high-stress environments (<xref ref-type="bibr" rid="B158">Wiederhold, 2024a</xref>).</p>
<p>To respond in real time to the evolving dynamic emotional map of a targeted population (on an hourly or daily basis), the LLM-Based EBSC Transformer is expected to operate partially autonomously under human supervision&#x02014;for example, at higher levels of the 10-level taxonomy proposed by <xref ref-type="bibr" rid="B144">Sheridan and Verplank (1978)</xref>. Balancing real-time responsiveness with mandatory human oversight suggests the need to allow partially automated crafting and transmission of multimedia messages, while keeping human supervisors in the loop. In more extreme cases, where dynamic emotional maps exhibit profound volatility and negative collective orientations, strategic transformation layer can alert human supervisors to collaborate on message crafting and approve the transmission of messages to stabilize these highly volatile emotional maps.</p>
<p>Within the closed loop, this layer augments human decision-makers&#x00027; cognitive awareness and metacognitive self-awareness, as well as their cognitive clarity, literacy, and flexibility, thereby increasing cognitive dominance and operational preparedness and readiness. It also mitigates lapses due to cognitive biases and supports more unbiased decision-making under stress and uncertainty, enabling effective responses in crisis situations and facilitating decision-making superiority. This layer broadens and enhances perception, cognition, working memory, attention, situational awareness, and decision-making performance, countering the detrimental effects of fatigue, strong emotions, and cognitive overload. It supports emotional regulation and control over attention, judgment, emotion, and memory; helps to manage stress, bias, and uncertainty; and contributes to stress resilience and mental health in inherently high-stress decision-making environments. Altogether, it supports human judgment, real-time analytical capacity and endurance, foresight and risk calibration, integrity, empathy, and ethics&#x02014;promoting responsible, anticipatory rather than reactive governance and leadership, and reducing reliance on fast, inadequately thought-through heuristic decisions in high-stakes, emotion-laden environments.</p>
<p>LLM-driven multilingual discourse analysis and predictive models of influence, in the face of adversarial pressure, can also enable tracking of cognitive changes related to attention, memory, and resilience factors among targeted populations.</p></sec>
<sec>
<label>5.1.3</label>
<title>Output communication layer</title>
<p>This layer distributes and transmits multimedia messages that resonate emotionally, constructively guide audiences toward stabilizing narratives, and remain coherent with the broader communication strategy. It includes digital and traditional channels such as social media, online platforms, leaflets, radio, television, newspapers, and public gatherings.</p>
<p>Supervisory control by humans &#x0201C;on the loop&#x0201D; (<xref ref-type="bibr" rid="B154">van Diggelen et al., 2025</xref>) of proposed closed-loop system should be conducted in line with appropriate, well-founded EU/NATO ontologies and methodologies (<xref ref-type="bibr" rid="B14">Bebber, 2025</xref>). Understanding the local values, culture, habits, emotions, and sentiments of the targeted population is critically important as part of the necessary personalization of EBSC to achieve meaningful performance and efficiency.</p>
<p>EBSC serves as the translation engine, turning cognitive neuroscience and AI insights into legitimate, emotionally resonant, and strategically aligned communications that reinforce EU/NATO cohesion, counter and outpace adversary narratives, and strengthen societal resilience. Accordingly, the EBSC approach goes beyond &#x0201C;quick technological fixes&#x0201D; against offensive cognitive warfare&#x02014;such as &#x0201C;AI-based early warning systems&#x0201D; or &#x0201C;state-run, internet-wide content moderation tools&#x0201D;&#x02014;which have been criticized in the literature (<xref ref-type="bibr" rid="B89">Lahmann et al., 2025</xref>). Instead, LLM-based AI tools with deep cognitive understanding of the multidimensional and complex nature of targeted populations&#x02014;psychologically, politically, economically, and in security terms&#x02014;are used within EBSC to extend situational awareness (<xref ref-type="bibr" rid="B52">Endsley, 1995</xref>, <xref ref-type="bibr" rid="B53">2000</xref>), and increase the effectiveness of observe&#x02013;orient&#x02013;decide&#x02013;act (OODA) loops (<xref ref-type="bibr" rid="B15">Boyd, 1996</xref>; <xref ref-type="bibr" rid="B77">Ho and Kuah, 2014</xref>; <xref ref-type="bibr" rid="B150">Tanui, 2021</xref>; <xref ref-type="bibr" rid="B38">Daniels, 2021</xref>). Decision-makers, as supervisory humans &#x0201C;on the loop,&#x0201D; must retain ultimate accountability for the strategic communications messages disseminated to targeted audiences. The emerging discourse on humane AI underscores that defense-related AI systems should be designed around human dignity, transparency, and proportionality&#x02014;principles consistent with EBSC&#x00027;s emphasis on ethically grounded, democratically accountable influence operations (<xref ref-type="bibr" rid="B131">Riva et al., 2025</xref>).</p>
<p>Such requirements align with similar considerations in prior literature (<xref ref-type="bibr" rid="B154">van Diggelen et al., 2025</xref>; <xref ref-type="bibr" rid="B149">Taddeo and Floridi, 2018b</xref>) and with auditing proposals for large-scale AI systems (<xref ref-type="bibr" rid="B128">Raji et al., 2020</xref>), particularly those involved in opinion dynamics control (<xref ref-type="bibr" rid="B39">DeBuse and Warnick, 2023</xref>, <xref ref-type="bibr" rid="B40">2024</xref>). Likewise, the LLM-based EBSC Transformer proposed in this article should ensure compliance with International Humanitarian Law (<xref ref-type="bibr" rid="B133">Rodenh&#x000E4;user, 2023</xref>), the EU AI Act, the General Data Protection Regulation (GDPR), the Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations (<xref ref-type="bibr" rid="B141">Schmitt, 2017</xref>), and other applicable EU regulations.</p></sec></sec>
</sec>
<sec id="s6">
<label>6</label>
<title>Enhancement of European defense policy by emotionally based strategic communications</title>
<p>The proposed closed-loop LLM-based EBSC Transformer could be integrated into European defense strategic communications policy and aligned with EU frameworks on resilience and counter-disinformation (<xref ref-type="bibr" rid="B43">Delwaulle, 2024</xref>; <xref ref-type="bibr" rid="B55">European Commission, 2018</xref>; <xref ref-type="bibr" rid="B132">R&#x000F8;d et al., 2025</xref>). At the recent panel at the Dubrovnik Forum (11&#x02013;12 July 2025), titled &#x0201C;European Defense Policy Enhanced by Convergence of Cognitive Neuroscience and Artificial Intelligence&#x0201D; (<xref ref-type="bibr" rid="B66">Government of Croatia, 2025</xref>; <xref ref-type="bibr" rid="B112">MVEPRH, 2025</xref>), participants discussed the potential of merging cognitive neuroscience and AI to bolster EU defense capabilities during military stressful operations.</p>
<p>In the introductory remarks, it was emphasized that &#x0201C;in the evolving domain of European defense and security affairs, cognitive neuroscience and AI should emerge as influential forces which can significantly enhance European defense potential when global threats arise rapidly, and when Europe faces a pressing need to enhance its defensive cognitive warfare strategies, leveraging theoretical and applied knowledge from cognitive neuroscience and AI. Having interdisciplinary knowledge to identify relevant features and develop AI-based models for prediction of potential military aggression early enough is extremely important. Therefore, AI-based cognitive superiority within the European defense system should be extremely valuable as strategic guidance for future work on a complex, distributed, and multi-layered AI-based defense system, laying the foundation for our future joint research on European defense, security, and operational superiority.&#x0201D; This message reflects and builds upon similar previous calls for enhanced use of AI for European defense in the area of cybersecurity (<xref ref-type="bibr" rid="B148">Taddeo and Floridi, 2018a</xref>).</p>
<p>Cognitive neuroscience can support a deeper understanding of human emotion, cognition, and behavior in defense strategic contexts, providing innovative insights into perception, beliefs, trust, situational awareness, decision-making, attention, leadership, working memory, mental stress, stress resilience, mental health, operational readiness, fatigue, and cognitive overload as key operational defense capabilities (<xref ref-type="bibr" rid="B30">Cosi&#x00107; et al., 2022</xref>).</p>
<p>Neuroscience also reveals how military leaders manage stress, bias, uncertainty, and complex warfare scenarios, enabling risk-informed strategic foresight. It shows how repeated exposure to propaganda shapes beliefs (Hebb&#x00027;s rule, &#x0201C;fire together, wire together&#x0201D;). Cognitive warfare targets not only soldiers, but entire societies, undermining trust in institutions and public perception that can induce societal polarization and destabilize democratic systems. AI systems could analyze how adversarial disinformation spreads across European media and social networks (<xref ref-type="bibr" rid="B121">Pacheco et al., 2021</xref>; <xref ref-type="bibr" rid="B24">Cinelli et al., 2022</xref>; <xref ref-type="bibr" rid="B142">Sharma et al., 2021</xref>; <xref ref-type="bibr" rid="B100">Marigliano et al., 2024</xref>), allowing European defense and security policymakers to respond faster and more effectively. Recent work in cyberpsychology similarly emphasizes that countering AI-driven disinformation requires an integrated approach combining technical detection, strategic communications, and psychological resilience-building at the societal level (<xref ref-type="bibr" rid="B159">Wiederhold, 2024b</xref>).</p>
<p>However, neither cognitive neuroscience nor AI can replace sound human democratic political judgment. Working together, they can amplify human reasoning, sharpen situational awareness, and enhance strategic depth. Integrating cognitive neuroscience and AI into European defense and security affairs promises more adaptive, resilient, and effective strategies that address the complexities of modern threats. This interdisciplinary approach has the potential to enhance operational capabilities, improve effectiveness, strengthen mental resilience and wellbeing among soldiers, improve mission outcomes, and ultimately ensure greater security and stability. It also promotes a deeper understanding of human factors such as cognitive limitations, overload, and fatigue, which can undermine defense performance and capabilities.</p>
<p>AI can analyze vast amounts of data to identify patterns and predict potential threats, while cognitive neuroscience can provide insights into how decision-makers think and react under pressure (<xref ref-type="bibr" rid="B126">Porcelli and Delgado, 2017</xref>; <xref ref-type="bibr" rid="B4">Arnsten, 2009</xref>). This synergy can lead to improved situational awareness and more effective responses in crisis situations. Cognitive augmentation, real-time analytical capacity, and predictive simulation in support of decision-making under uncertain, complex conflict and negotiation scenarios&#x02014;based on AI&#x02014;can enhance tactical, operational, and strategic speed through predictive capabilities.</p>
<p>The interdisciplinary approach combining cognitive neuroscience and AI holds great promise for enhancing our understanding of strategic decision-making and creating more sophisticated predictive models that can be applied across various sectors to develop more adaptive, resilient, and effective strategies for modern and future warfare operations. Europe&#x00027;s strategic future will not be determined solely by kinetic force, but increasingly by cognitive readiness (<xref ref-type="bibr" rid="B57">Fletcher and Wind, 2013</xref>; <xref ref-type="bibr" rid="B67">Grier, 2012</xref>), adaptive cognitive neuroscience and AI integration, and strategic, emotionally based multimodal communications. These issues should not remain a theoretical ambition, but should be treated as a strategic necessity, forming the foundation of a new generation of defense capabilities centered not only on precise firepower, but on the development of predictive models that function as powerful preventive and proactive tools in European strategic defense and security affairs.</p>
<p>EBSC supported by cognitive neuroscience and AI offers tools to identify, track, and deconstruct emotional trajectories in real time in turbulent warfare environments and contexts of societal instability. For example, sentiment analysis of political discourse can detect shifts in public mood and policy framing, while AI-supported decision dashboards can be designed to reduce bias and highlight overlooked information. These tools, however, are only effective if decision-makers are trained in cognitive awareness and supported by systems that reward strategic patience over emotional reflexes. This may be especially challenging for &#x0201C;dark leadership&#x0201D; decision-maker profiles (<xref ref-type="bibr" rid="B63">Giannouli, 2025</xref>), as hubristic overconfidence and narcissistic status sensitivity can bias threat appraisal, reduce receptivity to corrective feedback, and incentivize the strategic use of outrage or humiliation rather than emotional regulation (<xref ref-type="bibr" rid="B119">Owen and Davidson, 2009</xref>; <xref ref-type="bibr" rid="B5">Asad and Sadler-Smith, 2020</xref>; <xref ref-type="bibr" rid="B117">O&#x00027;Reilly and Hall, 2021</xref>; <xref ref-type="bibr" rid="B60">Gauglitz et al., 2023</xref>), particularly when evidence from AI-supported decision dashboards is not aligned with leaders&#x00027; entrenched beliefs or self-image. Similarly, at the group level, collective narcissistic beliefs are associated with heightened threat sensitivity and hostility (<xref ref-type="bibr" rid="B65">Golec de Zavala, 2019</xref>; <xref ref-type="bibr" rid="B75">Hase et al., 2021</xref>), and the amplification of these reactions via emotional contagion (<xref ref-type="bibr" rid="B9">Barsade, 2002</xref>) may drive the group&#x00027;s pushback against de-escalatory strategic communications.</p>
<p>When EBSC is embedded in leadership training and strategic planning, it can help political actors navigate emotionally volatile environments without reinforcing cycles of escalation. EBSC enables a shift from emotional contagion to emotional regulation, and from reactive politics to anticipatory governance. Comparable multilevel emotion-cognition dynamics have also been documented in non-politico-military settings, such as emotionally demanding workplace environments, where leaders&#x00027; emotional regulation, leadership styles, and affective signaling shape subordinate cognition and decision-making, with implications for organizational resilience (<xref ref-type="bibr" rid="B61">Giannouli, 2017</xref>; <xref ref-type="bibr" rid="B12">Bataineh et al., 2025</xref>). Crucially, resilience to cognitive warfare requires a distributed capacity for emotional literacy, not only among elites but throughout democratic institutions. Public education, media literacy, and institutional design must align to foster deliberation rather than polarization, and comprehension rather than outrage. Europe&#x00027;s long-term security depends not only on technological advancement, but also on the emotional and cognitive sophistication of its political culture. Experience from multinational peacekeeping training initiatives indicates that structured readiness and resilience programs are strongly valued and can be aligned with broader NATO/EU goals in human-centric defense (<xref ref-type="bibr" rid="B163">Wiederhold and Wiederhold, 2024</xref>). Similarly, proposals to integrate cognitive-neuroscience-informed decision support with AI-enabled situational awareness highlight how human-centric, ethically governed technologies can enhance mission effectiveness and civilian protection (<xref ref-type="bibr" rid="B160">Wiederhold, 2025a</xref>).</p>
<p>The history of conflict has shown how information warfare&#x02014;including disinformation, social media manipulation, and, more recently, deepfakes&#x02014;can destabilize societies. Integration of neuroscience and AI can support the detection of cognitive vulnerabilities exploited by hostile actors (e.g., identity threats, fear contagion), and can contribute to the design of resilient information environments that reinforce cognitive clarity and emotional regulation. This may be facilitated by transparent, credible, and responsible systems for monitoring psychological stress across populations, enabling early interventions to prevent societal destabilization.</p>
<p>Complex EBSC layers enable affective framing that reinforces cohesion, builds trust and solidarity, and strengthens resilience by crafting counter-narratives in line with EU/NATO deterrence and defense postures to neutralize hostile influence. A closed-loop operational lifecycle should enable the collection and fusion of open-source/social media data and protected mission-specific signals and data, consistent with EU/NATO practices, generating cognitive-emotional battlespace maps that identify vulnerabilities and influence pathways.</p>
<p>AI-based design of EBSC messages should translate such models into emotionally resonant strategic communications that are affective, lawful, and consistent with EU/NATO narratives across official EU/NATO channels, partner states and governments, and digital media platforms. The strategic value of EBSC lies in its contribution to EU/NATO cohesion, through emotionally resonant communications that strengthen trust and solidarity among allies and prepare publics to resist adversarial disinformation and psychological pressure. EBSC doctrinal innovation that bridges neuroscience, AI, and communication into a new European strategic decision-making ecosystem may enhance EU defense and security policy and increase EU operational effectiveness, ensuring that NATO and the EU would maintain an edge in the cognitive warfare domain.</p>
<p>EBSC aims to protect, harden, and uplift public cognition, building societal and institutional integration, trust, cohesion, and agency based on LLM-assisted content analysis and synthesis. EBSC narratives should reinforce resilience through inoculation, pre-bunking, sense-making support, and pro-social framing (<xref ref-type="bibr" rid="B93">Lewandowsky and van der Linden, 2021</xref>; <xref ref-type="bibr" rid="B134">Roozenbeek and van der Linden, 2021</xref>; <xref ref-type="bibr" rid="B154">van Diggelen et al., 2025</xref>; <xref ref-type="bibr" rid="B130">Reuter et al., 2025</xref>; <xref ref-type="bibr" rid="B42">Defazio et al., 2021</xref>; <xref ref-type="bibr" rid="B7">Banker and Park, 2020</xref>). These align closely with inoculation-based approaches that expose individuals to weakened forms of manipulation to build psychological resistance against future disinformation attempts (<xref ref-type="bibr" rid="B161">Wiederhold, 2025b</xref>).</p>
<p>A range of computational tools can be applied within the EBSC framework, including automated emotion detection and sentiment analysis (<xref ref-type="bibr" rid="B113">Nandwani and Verma, 2021</xref>; <xref ref-type="bibr" rid="B74">Hasan et al., 2019</xref>; <xref ref-type="bibr" rid="B109">Mohammad, 2016</xref>; <xref ref-type="bibr" rid="B135">Rosado et al., 2022</xref>); narrative extraction and synthesis (<xref ref-type="bibr" rid="B139">Santana et al., 2023</xref>; <xref ref-type="bibr" rid="B118">Overney et al., 2025</xref>; <xref ref-type="bibr" rid="B165">Yan and Tang, 2023</xref>; <xref ref-type="bibr" rid="B87">Keith Norambuena and Mitra, 2021</xref>); causality and relations extraction (<xref ref-type="bibr" rid="B1">Ali et al., 2023</xref>; <xref ref-type="bibr" rid="B169">Zhao et al., 2024</xref>); automated claim detection (<xref ref-type="bibr" rid="B68">Guo et al., 2022</xref>; <xref ref-type="bibr" rid="B23">Choi and Ferrara, 2024</xref>; <xref ref-type="bibr" rid="B143">Sheikhi et al., 2023</xref>); and automated stance detection (<xref ref-type="bibr" rid="B88">K&#x000FC;&#x000E7;&#x000FC;k and Can, 2020</xref>; <xref ref-type="bibr" rid="B95">Li et al., 2021</xref>; <xref ref-type="bibr" rid="B59">Garg and Caragea, 2024</xref>; <xref ref-type="bibr" rid="B73">Hardalov et al., 2022</xref>). Additional tools include social botnet detection (<xref ref-type="bibr" rid="B168">Zhang et al., 2018</xref>; <xref ref-type="bibr" rid="B124">Patil and Deshpande, 2022</xref>), credibility assessment in social networks (<xref ref-type="bibr" rid="B2">Alrubaian et al., 2017a</xref>,<xref ref-type="bibr" rid="B3">b</xref>; <xref ref-type="bibr" rid="B155">Viviani and Pasi, 2017</xref>), social media anomaly and emergency detection (<xref ref-type="bibr" rid="B167">Yu et al., 2016</xref>; <xref ref-type="bibr" rid="B80">Huang et al., 2022</xref>), and privacy-preserving data analysis (<xref ref-type="bibr" rid="B48">Dwork and Roth, 2014</xref>; <xref ref-type="bibr" rid="B79">Huang et al., 2020</xref>).</p>
<p>Furthermore, EBSC complements other approaches for strengthening resilience against cognitive warfare, such as media literacy and pre-bunking curricula that teach recognition of common manipulation tactics (<xref ref-type="bibr" rid="B93">Lewandowsky and van der Linden, 2021</xref>; <xref ref-type="bibr" rid="B152">Traberg et al., 2023</xref>); instructional design using spaced practice to improve retention of skills related to recognizing manipulation cues (<xref ref-type="bibr" rid="B19">Cepeda et al., 2006</xref>, <xref ref-type="bibr" rid="B20">2008</xref>); and rumor-control resources that centralize clarifications and reduce uncertainty during cognitive warfare incidents (<xref ref-type="bibr" rid="B56">European Digital Media Observatory, n.d.</xref>; <xref ref-type="bibr" rid="B81">Innovative Data Intelligence Research Laboratory, n.d.</xref>; <xref ref-type="bibr" rid="B58">Full Fact, n.d.</xref>).</p>
<p>It will also be important to define and track appropriate key performance indicators to monitor the progress of EBSC implementation and execution, as well as the effectiveness of EBSC in terms of its intended impact on targeted populations. These indicators represent practical measures of effectiveness that are essential for evaluating and refining EBSC in operational contexts.</p></sec>
<sec sec-type="conclusion" id="s7">
<label>7</label>
<title>Conclusion</title>
<p>EBSC may serve as the transformation and translation engine, turning cognitive neuroscience and AI insights into legitimate, affective, emotionally resonant, and strategically aligned communications that reinforce EU/NATO defense cohesion, counter adversarial narratives, and strengthen societal resilience. In this way, EBSC contributes to the emerging European strategic decision-making ecosystem, offering a scientifically robust and ethically adaptable tool for protecting human perceptions, attitudes, and collective behaviors in the cognitive domain.</p>
<p>The potential of EBSC in the context of European defensive cognitive warfare lies in its capacity to enhance the emotional and cognitive capabilities of individuals and groups, thereby amplifying the effectiveness of societal defense. Grounded in a deep cognitive understanding of the multidimensional and complex human psychological, political, and economic dimensions of security, the proposed LLM-based EBSC approach can strengthen human cognitive, emotional, and behavioral processing capacities in defensive cognitive warfare, particularly in the battle for hearts and minds of targeted populations.</p>
<p>Its real power lies in coupling scientific models of emotion-cognition interaction with AI-enabled narrative delivery systems to respond effectively to cognitive warfare operations directed toward European societies by any current or future adversaries.</p></sec>
</body>
<back>
<sec sec-type="author-contributions" id="s8">
<title>Author contributions</title>
<p>K&#x00106;: Writing &#x02013; original draft, Visualization, Methodology, Supervision, Writing &#x02013; review &#x00026; editing, Conceptualization, Validation, Investigation. SP: Investigation, Visualization, Conceptualization, Validation, Writing &#x02013; review &#x00026; editing, Methodology. BW: Validation, Writing &#x02013; review &#x00026; editing, Investigation, Supervision.</p>
</sec>
<sec sec-type="COI-statement" id="conf1">
<title>Conflict of interest</title>
<p>The author(s) declared that this work was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.</p>
</sec>
<sec sec-type="ai-statement" id="s10">
<title>Generative AI statement</title>
<p>The author(s) declared that generative AI was used in the creation of this manuscript. The reasons were: improving the search of the literature relevant to recontextualization of the original EBSC concept for contemporary defensive cognitive warfare; polishing the sentences, reducing their complexity and improving their grammatical structure, in order to facilitate readers&#x00027; comprehension.</p>
<p>Any alternative text (alt text) provided alongside figures in this article has been generated by Frontiers with the support of artificial intelligence and reasonable efforts have been made to ensure accuracy, including review by the authors wherever possible. If you identify any issues, please contact us.</p></sec>
<sec sec-type="disclaimer" id="s11">
<title>Publisher&#x00027;s note</title>
<p>All claims expressed in this article are solely those of the authors and do not necessarily represent those of their affiliated organizations, or those of the publisher, the editors and the reviewers. Any product that may be evaluated in this article, or claim that may be made by its manufacturer, is not guaranteed or endorsed by the publisher.</p>
</sec>
<ref-list>
<title>References</title>
<ref id="B1">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ali</surname> <given-names>W.</given-names></name> <name><surname>Zuo</surname> <given-names>W.</given-names></name> <name><surname>Ying</surname> <given-names>W.</given-names></name> <name><surname>Ali</surname> <given-names>R.</given-names></name> <name><surname>Rahman</surname> <given-names>G.</given-names></name> <name><surname>Ullah</surname> <given-names>I.</given-names></name></person-group> (<year>2023</year>). <article-title>Causality extraction: a comprehensive survey and new perspective</article-title>. <source>J. King Saud Univ. Comput. Inf. Sci.</source> <volume>35</volume>:<fpage>101593</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jksuci.2023.101593</pub-id></mixed-citation>
</ref>
<ref id="B2">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Alrubaian</surname> <given-names>M.</given-names></name> <name><surname>Al-Qurishi</surname> <given-names>M.</given-names></name> <name><surname>Al-Rakhami</surname> <given-names>M.</given-names></name> <name><surname>Alamri</surname> <given-names>A.</given-names></name></person-group> (<year>2017a</year>). <article-title>&#x0201C;A credibility assessment model for online social network content,&#x0201D;</article-title> in <source>From Social Data Mining and Analysis to Prediction and Community Detection</source>, eds <person-group person-group-type="editor"><name><surname>Kaya</surname> <given-names>M.</given-names></name> <name><surname>Erdogan</surname> <given-names>&#x000D6;.</given-names></name> and <name><surname>Rokne</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>Cham</publisher-loc>: <publisher-name>Springer International Publishing</publisher-name>), <fpage>61</fpage>&#x02013;<lpage>77</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-3-319-51367-6_3</pub-id></mixed-citation>
</ref>
<ref id="B3">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Alrubaian</surname> <given-names>M.</given-names></name> <name><surname>Al-Qurishi</surname> <given-names>M.</given-names></name> <name><surname>Al-Rakhami</surname> <given-names>M.</given-names></name> <name><surname>Hassan</surname> <given-names>M. M.</given-names></name> <name><surname>Alamri</surname> <given-names>A.</given-names></name></person-group> (<year>2017b</year>). <article-title>Reputation-based credibility analysis of Twitter social network users</article-title>. <source>Concurr. Computat. Prac. Exp.</source> <volume>29</volume>:<fpage>e3873</fpage>. doi: <pub-id pub-id-type="doi">10.1002/cpe.3873</pub-id></mixed-citation>
</ref>
<ref id="B4">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Arnsten</surname> <given-names>A. F.</given-names></name></person-group> (<year>2009</year>). <article-title>Stress signalling pathways that impair prefrontal cortex structure and function</article-title>. <source>Nat. Rev. Neurosci.</source> <volume>10</volume>, <fpage>410</fpage>&#x02013;<lpage>422</lpage>. doi: <pub-id pub-id-type="doi">10.1038/nrn2648</pub-id><pub-id pub-id-type="pmid">19455173</pub-id></mixed-citation>
</ref>
<ref id="B5">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Asad</surname> <given-names>S.</given-names></name> <name><surname>Sadler-Smith</surname> <given-names>E.</given-names></name></person-group> (<year>2020</year>). <article-title>Differentiating leader hubris and narcissism on the basis of power</article-title>. <source>Leadership</source> <volume>16</volume>, <fpage>39</fpage>&#x02013;<lpage>61</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1742715019885763</pub-id></mixed-citation>
</ref>
<ref id="B6">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Baer</surname> <given-names>R. A.</given-names></name></person-group> (<year>2003</year>). <article-title>Mindfulness training as a clinical intervention: a conceptual and empirical review</article-title>. <source>Clin. Psychol. Sci. Pract.</source> <volume>10</volume>, <fpage>125</fpage>&#x02013;<lpage>143</lpage>. doi: <pub-id pub-id-type="doi">10.1093/clipsy.bpg015</pub-id></mixed-citation>
</ref>
<ref id="B7">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Banker</surname> <given-names>S.</given-names></name> <name><surname>Park</surname> <given-names>J.</given-names></name></person-group> (<year>2020</year>). <article-title>Evaluating prosocial COVID-19 messaging frames: evidence from a field study on Facebook</article-title>. <source>Judgm. Decis. Mak.</source> <volume>15</volume>, <fpage>1037</fpage>&#x02013;<lpage>1043</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S1930297500008226</pub-id></mixed-citation>
</ref>
<ref id="B8">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Barrett</surname> <given-names>L. F.</given-names></name></person-group> (<year>1998</year>). <article-title>Discrete emotions or dimensions? The role of valence focus and arousal focus</article-title>. <source>Cogn. Emot.</source> <volume>12</volume>, <fpage>579</fpage>&#x02013;<lpage>599</lpage>. doi: <pub-id pub-id-type="doi">10.1080/026999398379574</pub-id></mixed-citation>
</ref>
<ref id="B9">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Barsade</surname> <given-names>S. G.</given-names></name></person-group> (<year>2002</year>). <article-title>The ripple effect: emotional contagion and its influence on group behavior</article-title>. <source>Admin. Sci. Q.</source> <volume>47</volume>, <fpage>644</fpage>&#x02013;<lpage>675</lpage>. doi: <pub-id pub-id-type="doi">10.2307/3094912</pub-id></mixed-citation>
</ref>
<ref id="B10">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bar-Tal</surname> <given-names>D.</given-names></name></person-group> (<year>2001</year>). <article-title>Why does fear override hope in societies engulfed by intractable conflict, as it does in the Israeli society?</article-title> <source>Polit. Psychol.</source> <volume>22</volume>, <fpage>601</fpage>&#x02013;<lpage>627</lpage>. doi: <pub-id pub-id-type="doi">10.1111/0162-895X.00255</pub-id></mixed-citation>
</ref>
<ref id="B11">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bar-Tal</surname> <given-names>D.</given-names></name> <name><surname>Halperin</surname> <given-names>E.</given-names></name> <name><surname>de Rivera</surname> <given-names>J.</given-names></name></person-group> (<year>2007</year>). <article-title>Collective emotions in conflict situations: societal implications</article-title>. <source>J. Soc. Iss.</source> <volume>63</volume>, <fpage>441</fpage>&#x02013;<lpage>460</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1540-4560.2007.00518.x</pub-id></mixed-citation>
</ref>
<ref id="B12">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Bataineh</surname> <given-names>A. Q.</given-names></name> <name><surname>Alhur</surname> <given-names>M.</given-names></name> <name><surname>Qasim</surname> <given-names>D.</given-names></name> <name><surname>Shuhaiber</surname> <given-names>A.</given-names></name></person-group> (<year>2025</year>). <article-title>The role of emotional intelligence in enhancing organizational resilience: examining the moderating impact of transformational leadership</article-title>. <source>Probl. Perspect. Manage.</source> <volume>23</volume>:<fpage>79</fpage>. doi: <pub-id pub-id-type="doi">10.21511/ppm.23(3).2025.07</pub-id></mixed-citation>
</ref>
<ref id="B13">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Baum</surname> <given-names>M. A.</given-names></name> <name><surname>Groeling</surname> <given-names>T. J.</given-names></name></person-group> (<year>2009</year>). <source>War Stories: The Causes and Consequences of Public Views of War</source>. Princeton University Press. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.jstor.org/stable/j.ctt7s9cq">https://www.jstor.org/stable/j.ctt7s9cq</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B14">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Bebber</surname> <given-names>R. J.</given-names></name></person-group> (<year>2025</year>). <source>Information Inoculation: Preparing US Warfighters for Cognitive War</source>. Hudson Institute. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.hudson.org/national-security-defense/information-inoculation-preparing-us-warfighters-cognitive-war-robert-bebber">https://www.hudson.org/national-security-defense/information-inoculation-preparing-us-warfighters-cognitive-war-robert-bebber</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B15">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Boyd</surname> <given-names>J. R.</given-names></name></person-group> (<year>1996</year>). <source>The Essence of Winning and Losing. Unpublished Lecture Notes</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://neilhacker.com/wp-content/uploads/2020/02/essence_of_winning_losing-copy.pdf">https://neilhacker.com/wp-content/uploads/2020/02/essence_of_winning_losing-copy.pdf</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B16">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Braunstein</surname> <given-names>L. M.</given-names></name> <name><surname>Gross</surname> <given-names>J. J.</given-names></name> <name><surname>Ochsner</surname> <given-names>K. N.</given-names></name></person-group> (<year>2017</year>). <article-title>Explicit and implicit emotion regulation: a multi-level framework</article-title>. <source>Soc. Cogn. Affect. Neurosci.</source> <volume>12</volume>, <fpage>1545</fpage>&#x02013;<lpage>1557</lpage>. doi: <pub-id pub-id-type="doi">10.1093/scan/nsx096</pub-id><pub-id pub-id-type="pmid">28981910</pub-id></mixed-citation>
</ref>
<ref id="B17">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Buechel</surname> <given-names>S.</given-names></name> <name><surname>Hahn</surname> <given-names>U.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;EmoBank: studying the impact of annotation perspective and representation format on dimensional emotion analysis,&#x0201D;</article-title> in <source>Proceedings of the 15th Conference of the European Chapter of the ACL (EACL 2017)</source>, 578&#x02013;585. Available online at: <ext-link ext-link-type="uri" xlink:href="https://aclanthology.org/E17-2092/">https://aclanthology.org/E17-2092/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B18">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Canetti</surname> <given-names>D.</given-names></name> <name><surname>Elad-Strenger</surname> <given-names>J.</given-names></name> <name><surname>Lavi</surname> <given-names>I.</given-names></name> <name><surname>Guy</surname> <given-names>D.</given-names></name> <name><surname>Bar-Tal</surname> <given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>Exposure to violence, ethos of conflict, and support for compromise: surveys in Israel, East Jerusalem, West Bank, and Gaza</article-title>. <source>J. Confl. Resol.</source> <volume>61</volume>, <fpage>84</fpage>&#x02013;<lpage>113</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0022002715569771</pub-id></mixed-citation>
</ref>
<ref id="B19">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cepeda</surname> <given-names>N. J.</given-names></name> <name><surname>Pashler</surname> <given-names>H.</given-names></name> <name><surname>Vul</surname> <given-names>E.</given-names></name> <name><surname>Wixted</surname> <given-names>J. T.</given-names></name> <name><surname>Rohrer</surname> <given-names>D.</given-names></name></person-group> (<year>2006</year>). <article-title>Distributed practice in verbal recall tasks: a review and quantitative synthesis</article-title>. <source>Psychol. Bull.</source> <volume>132</volume>:<fpage>354</fpage>. doi: <pub-id pub-id-type="doi">10.1037/0033-2909.132.3.354</pub-id><pub-id pub-id-type="pmid">16719566</pub-id></mixed-citation>
</ref>
<ref id="B20">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cepeda</surname> <given-names>N. J.</given-names></name> <name><surname>Vul</surname> <given-names>E.</given-names></name> <name><surname>Rohrer</surname> <given-names>D.</given-names></name> <name><surname>Wixted</surname> <given-names>J. T.</given-names></name> <name><surname>Pashler</surname> <given-names>H.</given-names></name></person-group> (<year>2008</year>). <article-title>Spacing effects in learning: a temporal ridgeline of optimal retention</article-title>. <source>Psychol. Sci.</source> <volume>19</volume>, <fpage>1095</fpage>&#x02013;<lpage>1102</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1467-9280.2008.02209.x</pub-id><pub-id pub-id-type="pmid">19076480</pub-id></mixed-citation>
</ref>
<ref id="B21">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chan</surname> <given-names>E.</given-names></name></person-group> (<year>2025a</year>). <article-title>Inception in narrative engineering in intelligence and geopolitics</article-title>. <source>APSA</source> [Preprints]. doi: <pub-id pub-id-type="doi">10.33774/apsa-2025-7pd03</pub-id></mixed-citation>
</ref>
<ref id="B22">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Chan</surname> <given-names>E.</given-names></name></person-group> (<year>2025b</year>). <article-title>Seeding perceptions: modern influence operations in global security</article-title>. <source>APSA</source> [Preprints]. doi: <pub-id pub-id-type="doi">10.33774/apsa-2025-jxzm3</pub-id></mixed-citation>
</ref>
<ref id="B23">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Choi</surname> <given-names>E. C.</given-names></name> <name><surname>Ferrara</surname> <given-names>E.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x0201C;Automated claim matching with large language models: empowering fact-checkers in the fight against misinformation,&#x0201D;</article-title> in <source>Companion Proceedings of the ACM Web Conference 2024</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name>), <fpage>1441</fpage>&#x02013;<lpage>1449</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3589335.3651910</pub-id></mixed-citation>
</ref>
<ref id="B24">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cinelli</surname> <given-names>M.</given-names></name> <name><surname>Cresci</surname> <given-names>S.</given-names></name> <name><surname>Quattrociocchi</surname> <given-names>W.</given-names></name> <name><surname>Tesconi</surname> <given-names>M.</given-names></name> <name><surname>Zola</surname> <given-names>P.</given-names></name></person-group> (<year>2022</year>). <article-title>Coordinated inauthentic behavior and information spreading on Twitter</article-title>. <source>Decis. Support Syst.</source> <volume>160</volume>:<fpage>113819</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.dss.2022.113819</pub-id></mixed-citation>
</ref>
<ref id="B25">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Clark</surname> <given-names>D. A.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;Cognitive restructuring,&#x0201D;</article-title> in <source>The Wiley Handbook of Cognitive Behavioral Therapy</source>, eds <person-group person-group-type="editor"><name><surname>Hofmann</surname> <given-names>S. G.</given-names></name> <name><surname>Dozois</surname> <given-names>D. J. A.</given-names></name> <name><surname>Rief</surname> <given-names>W.</given-names></name> and <name><surname>Smits</surname> <given-names>J.</given-names></name></person-group> (<publisher-loc>Chichester</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons</publisher-name>), <fpage>1</fpage>&#x02013;<lpage>22</lpage>. doi: <pub-id pub-id-type="doi">10.1002/9781118528563.wbcbt02</pub-id></mixed-citation>
</ref>
<ref id="B26">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Claverie</surname> <given-names>B.</given-names></name> <name><surname>du Cluzel</surname> <given-names>F.</given-names></name></person-group> (<year>2022</year>). <source>The Cognitive Warfare Concept</source>. Innovation Hub Sponsored by NATO Allied Command Transformation, 2. Available online at: <ext-link ext-link-type="uri" xlink:href="https://innovationhub-act.org/wp-content/uploads/2023/12/CW-article-Claverie-du-Cluzel-final_0.pdf">https://innovationhub-act.org/wp-content/uploads/2023/12/CW-article-Claverie-du-Cluzel-final_0.pdf</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B27">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cohen</surname> <given-names>S.</given-names></name></person-group> (<year>1980</year>). <article-title>Aftereffects of stress on human performance and social behavior: a review of research and theory</article-title>. <source>Psychol. Bull.</source> <volume>88</volume>:<fpage>82</fpage>. doi: <pub-id pub-id-type="doi">10.1037/0033-2909.88.1.82</pub-id><pub-id pub-id-type="pmid">7403392</pub-id></mixed-citation>
</ref>
<ref id="B28">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Corman</surname> <given-names>S. R.</given-names></name> <name><surname>Dooley</surname> <given-names>K. J.</given-names></name></person-group> (<year>2008</year>). <source>Strategic Communication on a Rugged Landscape: Principles for Finding the Right Message</source>. Report &#x00023;0801. Tempe: Arizona State University, Consortium for Strategic Communication, Hugh Downs School of Human Communication. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/237346710_Strategic_Communication_on_a_Rugged_Landscape_Principles_for_Finding_the_Right_Message">https://www.researchgate.net/publication/237346710_Strategic_Communication_on_a_Rugged_Landscape_Principles_for_Finding_the_Right_Message</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B29">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cosic</surname> <given-names>K.</given-names></name> <name><surname>Kopilas</surname> <given-names>V.</given-names></name> <name><surname>Jovanovic</surname> <given-names>T.</given-names></name></person-group> (<year>2024</year>). <article-title>War, emotions, mental health, and artificial intelligence</article-title>. <source>Front. Psychol.</source> <volume>15</volume>:<fpage>1394045</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2024.1394045</pub-id><pub-id pub-id-type="pmid">39156807</pub-id></mixed-citation>
</ref>
<ref id="B30">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name> <name><surname>&#x00160;arlija</surname> <given-names>M.</given-names></name> <name><surname>Kesed&#x0017D;i&#x00107;</surname> <given-names>I.</given-names></name> <name><surname>Gambira&#x0017D;a</surname> <given-names>M.</given-names></name></person-group> (<year>2022</year>). <article-title>&#x0201C;An approach to prediction of mental resilience in fighter pilot selection,&#x0201D;</article-title> in <source>Proceedings of the 1st International Conference on Cognitive Aircraft Systems (ICCAS 2022), Toulouse, France, 1&#x02013;2 June 2022</source> (<publisher-loc>Set&#x000FA;bal</publisher-loc>: <publisher-name>SCITEPRESS</publisher-name>), <fpage>83</fpage>&#x02013;<lpage>87</lpage>. doi: <pub-id pub-id-type="doi">10.5220/0011963800003622</pub-id></mixed-citation>
</ref>
<ref id="B31">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name> <name><surname>Srbljinovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Kova&#x0010D;</surname> <given-names>B.</given-names></name> <name><surname>Fabek</surname> <given-names>I.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;Extreme political attitudes and emotionally based strategic communications,&#x0201D;</article-title> in <source>New Tools to Enhance Posttraumatic Stress Disorder Diagnosis and Treatment</source>, ed B. K. Wiederhold (<publisher-loc>Amsterdam</publisher-loc>: <publisher-name>IOS Press</publisher-name>), <fpage>117</fpage>&#x02013;<lpage>135</lpage>.</mixed-citation>
</ref>
<ref id="B32">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Srbljinovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name></person-group> (<year>2018</year>). <article-title>Emotionally based strategic communications in the process of societal deradicalization</article-title>. <source>Int. J. Strategic Commun.</source> <volume>12</volume>, <fpage>196</fpage>&#x02013;<lpage>214</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1553118X.2018.1426587</pub-id></mixed-citation>
</ref>
<ref id="B33">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Srbljinovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name> <name><surname>Kostovi&#x00107;</surname> <given-names>I.</given-names></name> <name><surname>Juda&#x00161;</surname> <given-names>M.</given-names></name> <name><surname>Vuk&#x00161;i&#x00107;</surname> <given-names>M.</given-names></name></person-group> (<year>2011</year>). <article-title>&#x0201C;Extreme political attitudes and emotionally based strategic communications,&#x0201D;</article-title> in <source>6th General Conference of the European Consortium for Political Research (ECPR) (Reykjavik)</source>, <fpage>1</fpage>&#x02013;<lpage>20</lpage>.</mixed-citation>
</ref>
<ref id="B34">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Srbljinovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name> <name><surname>Kostovi&#x00107;</surname> <given-names>I.</given-names></name> <name><surname>Juda&#x00161;</surname> <given-names>M.</given-names></name> <name><surname>Vuk&#x00161;i&#x00107;</surname> <given-names>M.</given-names></name></person-group> (<year>2012a</year>). <article-title>Extreme political attitudes and emotionally based strategic communications (EBSC)</article-title>. <source>J. US-China Public Admin.</source> <volume>9</volume>, <fpage>637</fpage>&#x02013;<lpage>653</lpage>.</mixed-citation>
</ref>
<ref id="B35">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Cosi&#x00107;</surname> <given-names>K.</given-names></name> <name><surname>Srbljinovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Popovi&#x00107;</surname> <given-names>S.</given-names></name> <name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name> <name><surname>Wiederhold</surname> <given-names>M. D.</given-names></name></person-group> (<year>2012b</year>). <article-title>Emotionally based strategic communications and societal stress-related disorders</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>15</volume>, <fpage>597</fpage>&#x02013;<lpage>603</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2012.0410</pub-id><pub-id pub-id-type="pmid">23078339</pub-id></mixed-citation>
</ref>
<ref id="B36">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Crawford</surname> <given-names>N. C.</given-names></name></person-group> (<year>2000</year>). <article-title>The passion of world politics: propositions on emotion and emotional relationships</article-title>. <source>Int. Secur.</source> <volume>24</volume>, <fpage>116</fpage>&#x02013;<lpage>156</lpage>. doi: <pub-id pub-id-type="doi">10.1162/016228800560327</pub-id></mixed-citation>
</ref>
<ref id="B37">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Crawford</surname> <given-names>N. C.</given-names></name></person-group> (<year>2014</year>). <article-title>Institutionalizing passion in world politics: fear and empathy</article-title>. <source>Int. Theory</source> <volume>6</volume>, <fpage>535</fpage>&#x02013;<lpage>557</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S1752971914000256</pub-id></mixed-citation>
</ref>
<ref id="B38">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Daniels</surname> <given-names>O.</given-names></name></person-group> (<year>2021</year>). &#x0201C;Speeding up the OODA loop with AI: a helpful or limiting framework?&#x0201D; <italic>Joint Air and Space Power Conference 2021 Read Ahead, May 2021</italic>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.japcc.org/essays/speeding-up-the-ooda-loop-with-ai/">https://www.japcc.org/essays/speeding-up-the-ooda-loop-with-ai/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B39">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>DeBuse</surname> <given-names>M.</given-names></name> <name><surname>Warnick</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>&#x0201C;Automatic control of opinion dynamics in social networks,&#x0201D;</article-title> in <source>2023 IEEE Conference on Control Technology and Applications (CCTA)</source> (<publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>180</fpage>&#x02013;<lpage>185</lpage>. doi: <pub-id pub-id-type="doi">10.1109/CCTA54093.2023.10253399</pub-id></mixed-citation>
</ref>
<ref id="B40">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>DeBuse</surname> <given-names>M.</given-names></name> <name><surname>Warnick</surname> <given-names>S.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x0201C;A study of three influencer archetypes for the control of opinion spread in time-varying social networks,&#x0201D;</article-title> in <source>2024 IEEE 63rd Conference on Decision and Control (CDC)</source> (<publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>5310</fpage>&#x02013;<lpage>5317</lpage>. doi: <pub-id pub-id-type="doi">10.1109/CDC56724.2024.10885979</pub-id></mixed-citation>
</ref>
<ref id="B41">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>DeBuse</surname> <given-names>M. A.</given-names></name></person-group> (<year>2024</year>). <source>Narrative engineering: tools, computational structure, and impact of stories</source> (<publisher-loc>Doctoral dissertation, Brigham Young University</publisher-loc>). Theses and Dissertations 10631. Available online at: <ext-link ext-link-type="uri" xlink:href="https://scholarsarchive.byu.edu/etd/10631">https://scholarsarchive.byu.edu/etd/10631</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B42">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Defazio</surname> <given-names>D.</given-names></name> <name><surname>Franzoni</surname> <given-names>C.</given-names></name> <name><surname>Rossi-Lamastra</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>How pro-social framing affects the success of crowdfunding projects: the role of emphasis and information crowdedness</article-title>. <source>J. Business Ethics</source> 357&#x02013;378. doi: <pub-id pub-id-type="doi">10.1007/s10551-020-04428-1</pub-id></mixed-citation>
</ref>
<ref id="B43">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Delwaulle</surname> <given-names>M. P. R.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x0201C;Resilience in the face of disinformation: how can EUROPEAN states counter Russian information warfare,&#x0201D;</article-title> in <source>Inversions&#x02013;The Good and the Bad of Digitalization</source>, 10. Available online at: <ext-link ext-link-type="uri" xlink:href="https://d-nb.info/1354678311/34&#x00023;page=12">https://d-nb.info/1354678311/34&#x00023;page=12</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B44">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Demszky</surname> <given-names>D.</given-names></name> <name><surname>Movshovitz-Attias</surname> <given-names>D.</given-names></name> <name><surname>Ko</surname> <given-names>J.</given-names></name> <name><surname>Cowen</surname> <given-names>A.</given-names></name> <name><surname>Nemade</surname> <given-names>G.</given-names></name> <name><surname>Ravi</surname> <given-names>S.</given-names></name></person-group> (<year>2020</year>). <article-title>&#x0201C;GoEmotions: a dataset of fine-grained emotions,&#x0201D;</article-title> in <source>Proceedings of ACL 2020</source> (<publisher-loc>Association for Computational Linguistics</publisher-loc>), <fpage>4040</fpage>&#x02013;<lpage>4054</lpage>. doi: <pub-id pub-id-type="doi">10.18653/v1/2020.acl-main.372</pub-id></mixed-citation>
</ref>
<ref id="B45">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Deppe</surname> <given-names>C.</given-names></name> <name><surname>Schaal</surname> <given-names>G. S.</given-names></name></person-group> (<year>2024</year>). <article-title>Cognitive warfare: a conceptual analysis of the NATO ACT cognitive warfare exploratory concept</article-title>. <source>Front. Big Data</source> <volume>7</volume>:<fpage>1452129</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fdata.2024.1452129</pub-id><pub-id pub-id-type="pmid">39552633</pub-id></mixed-citation>
</ref>
<ref id="B46">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Driskell</surname> <given-names>J. E.</given-names></name> <name><surname>Salas</surname> <given-names>E.</given-names></name> <name><surname>Johnston</surname> <given-names>J. H.</given-names></name> <name><surname>Wollert</surname> <given-names>T. N.</given-names></name></person-group> (<year>2018</year>). <article-title>&#x0201C;Stress exposure training: an event-based approach,&#x0201D;</article-title> in <source>Performance Under Stress</source>, eds <person-group person-group-type="editor"><name><surname>Hancock</surname> <given-names>P. A.</given-names></name> and <name><surname>Szalma</surname> <given-names>J. L.</given-names></name></person-group> (<publisher-loc>London</publisher-loc>: <publisher-name>CRC Press</publisher-name>), <fpage>287</fpage>&#x02013;<lpage>302</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.taylorfrancis.com/books/edit/10.1201/9781315599946/performance-stress-james-szalma-peter-hancock">https://www.taylorfrancis.com/books/edit/10.1201/9781315599946/performance-stress-james-szalma-peter-hancock</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B47">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>du Cluzel</surname> <given-names>F.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x0201C;Cognitive warfare, a battle for the brain,&#x0201D;</article-title> in <source>Meeting Proceedings RDP&#x02013;NATO Symposium on Applying Neuroscience to Performance: From Rehabilitation to Human Cognitive 2021</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://organizedabuse.support/wp-content/uploads/2025/02/cognitive-warfare-a-battle-for-the-brain.pdf">https://organizedabuse.support/wp-content/uploads/2025/02/cognitive-warfare-a-battle-for-the-brain.pdf</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B48">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Dwork</surname> <given-names>C.</given-names></name> <name><surname>Roth</surname> <given-names>A.</given-names></name></person-group> (<year>2014</year>). <article-title>The algorithmic foundations of differential privacy</article-title>. <source>Found. Trends Theor. Comput. Sci</source>. <volume>9</volume>, <fpage>211</fpage>&#x02013;<lpage>407</lpage>. doi: <pub-id pub-id-type="doi">10.1561/0400000042</pub-id></mixed-citation>
</ref>
<ref id="B49">
<mixed-citation publication-type="web"><collab>East StratCom Task Force</collab> (<year>n.d.</year>). <source>EUvsDisinfo</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://euvsdisinfo.eu/">https://euvsdisinfo.eu/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B50">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ecker</surname> <given-names>U. K. H.</given-names></name> <name><surname>Lewandowsky</surname> <given-names>S.</given-names></name> <name><surname>Cook</surname> <given-names>J.</given-names></name> <name><surname>Schmid</surname> <given-names>P.</given-names></name> <name><surname>Fazio</surname> <given-names>L.</given-names></name> <name><surname>Brashier</surname> <given-names>N.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>The psychological drivers of misinformation belief and its resistance to correction</article-title>. <source>Nat. Rev. Psychol.</source> <volume>1</volume>, <fpage>13</fpage>&#x02013;<lpage>29</lpage>. doi: <pub-id pub-id-type="doi">10.1038/s44159-021-00006-y</pub-id></mixed-citation>
</ref>
<ref id="B51">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ekman</surname> <given-names>P.</given-names></name></person-group> (<year>1992</year>). <article-title>Facial expressions of emotion: an old controversy and new findings. Philosophical Transactions of the Royal Society of London</article-title>. <source>Ser. B, Biol. Sci.</source> <volume>335</volume>, <fpage>63</fpage>&#x02013;<lpage>69</lpage>. doi: <pub-id pub-id-type="doi">10.1098/rstb.1992.0008</pub-id></mixed-citation>
</ref>
<ref id="B52">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Endsley</surname> <given-names>M. R.</given-names></name></person-group> (<year>1995</year>). <article-title>Toward a theory of situation awareness in dynamic systems</article-title>. <source>Hum. Factors</source> <volume>37</volume>, <fpage>32</fpage>&#x02013;<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1518/001872095779049543</pub-id></mixed-citation>
</ref>
<ref id="B53">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Endsley</surname> <given-names>M. R.</given-names></name></person-group> (<year>2000</year>). <article-title>&#x0201C;Theoretical underpinnings of situation awareness: a critical review,&#x0201D;</article-title> in <source>Situation Awareness Analysis and Measurement</source>, eds. <person-group person-group-type="editor"><name><surname>Endsley</surname> <given-names>M. R.</given-names></name> and <name><surname>Garland</surname> <given-names>D. J.</given-names></name></person-group> (<publisher-loc>Mahwah, NJ</publisher-loc>: <publisher-name>Lawrence Erlbaum Associates</publisher-name>), <fpage>3</fpage>&#x02013;<lpage>28</lpage>. doi: <pub-id pub-id-type="doi">10.1201/b12461</pub-id></mixed-citation>
</ref>
<ref id="B54">
<mixed-citation publication-type="web"><collab>EU</collab> (<year>2022</year>). <source>A Strategic Compass for Security and Defence</source>. Brussels: EU. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.eeas.europa.eu/sites/default/files/documents/strategic_compass_en3_web.pdf">https://www.eeas.europa.eu/sites/default/files/documents/strategic_compass_en3_web.pdf</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B55">
<mixed-citation publication-type="web"><collab>European Commission</collab> (<year>2018</year>). <source>A Multi-Dimensional Approach to Disinformation. Report of the Independent High Level Group on Fake News and Online Disinformation</source>. Luxembourg: Publications Office of the European Union. Available online at: <ext-link ext-link-type="uri" xlink:href="https://op.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1/language-en">https://op.europa.eu/en/publication-detail/-/publication/6ef4df8b-4cea-11e8-be1d-01aa75ed71a1/language-en</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B56">
<mixed-citation publication-type="web"><collab>European Digital Media Observatory</collab> (<year>n.d.</year>). <source>United Against Disinformation</source>. EDMO. Available online at: <ext-link ext-link-type="uri" xlink:href="https://edmo.eu/">https://edmo.eu/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B57">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Fletcher</surname> <given-names>J. D.</given-names></name> <name><surname>Wind</surname> <given-names>A. P.</given-names></name></person-group> (<year>2013</year>). <article-title>&#x0201C;The evolving definition of cognitive readiness for military operations,&#x0201D;</article-title> in <source>Teaching and Measuring Cognitive Readiness</source>, eds <person-group person-group-type="editor"><name><surname>O&#x00027;Neil</surname> <given-names>H. F.</given-names></name> <name><surname>Perez</surname> <given-names>R. S.</given-names></name> and <name><surname>Baker</surname> <given-names>E. L.</given-names></name></person-group> (<publisher-loc>Boston, MA</publisher-loc>: <publisher-name>Springer US</publisher-name>), <fpage>25</fpage>&#x02013;<lpage>52</lpage>. doi: <pub-id pub-id-type="doi">10.1007/978-1-4614-7579-8_2</pub-id></mixed-citation>
</ref>
<ref id="B58">
<mixed-citation publication-type="web"><collab>Full Fact</collab> (<year>n.d.</year>). <source>Full Fact AI</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://fullfact.org/ai/">https://fullfact.org/ai/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B59">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Garg</surname> <given-names>K.</given-names></name> <name><surname>Caragea</surname> <given-names>C.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x0201C;Stanceformer: target-aware transformer for stance detection,&#x0201D;</article-title> in <source>Findings of EMNLP 2024</source> (<publisher-loc>Miami, FL</publisher-loc>: <publisher-name>Association for Computational Linguistics</publisher-name>), <fpage>3963</fpage>&#x02013;<lpage>3978</lpage>. doi: <pub-id pub-id-type="doi">10.18653/v1/2024.findings-emnlp.286</pub-id></mixed-citation>
</ref>
<ref id="B60">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Gauglitz</surname> <given-names>I. K.</given-names></name> <name><surname>Schyns</surname> <given-names>B.</given-names></name> <name><surname>Fehn</surname> <given-names>T.</given-names></name> <name><surname>Sch&#x000FC;tz</surname> <given-names>A.</given-names></name></person-group> (<year>2023</year>). <article-title>The dark side of leader narcissism: The relationship between leaders&#x00027; narcissistic rivalry and abusive supervision</article-title>. <source>J. Business Ethics</source> <volume>185</volume>, <fpage>169</fpage>&#x02013;<lpage>184</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10551-022-05146-6</pub-id></mixed-citation>
</ref>
<ref id="B61">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Giannouli</surname> <given-names>V.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;Emotional aspects of leadership in the modern workplace,&#x0201D;</article-title> in <source>Handbook of Research on Human Factors in Contemporary Workforce Development</source>, eds. <person-group person-group-type="editor"><name><surname>Christiansen</surname> <given-names>B.</given-names></name> and <name><surname>Chandan</surname> <given-names>H. C.</given-names></name></person-group> (IGI Global), <fpage>24</fpage>&#x02013;<lpage>59</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.igi-global.com/chapter/emotional-aspects-of-leadership-in-the-modernworkplace/180479">https://www.igi-global.com/chapter/emotional-aspects-of-leadership-in-the-modernworkplace/180479</ext-link> (Accessed December 30, 2025).</mixed-citation>
</ref>
<ref id="B62">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Giannouli</surname> <given-names>V.</given-names></name></person-group> (<year>2023</year>). <article-title>Are sex differences in self-estimated intelligence an elusive phenomenon? Exploring the role of working memory, creativity, and other psychological correlates in young and older adults</article-title>. <source>Brain Behav.</source> <volume>13</volume>, <fpage>e2857</fpage>. doi: <pub-id pub-id-type="doi">10.1002/brb3.2857</pub-id><pub-id pub-id-type="pmid">36704836</pub-id></mixed-citation>
</ref>
<ref id="B63">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Giannouli</surname> <given-names>V.</given-names></name></person-group> (<year>2025</year>). <article-title>&#x0201C;Hubris, machiavellianism, and narcissism: Cognitive and emotional underpinnings of dark leadership,&#x0201D;</article-title> in <source>Machiavellianism: Political Strategies, Psychological Dimensions and Societal Influence</source>, eds. <person-group person-group-type="editor"><name><surname>Prichard</surname> <given-names>E. C.</given-names></name> and <name><surname>Strong</surname> <given-names>C.</given-names></name></person-group> (Nova Science Publishers), <fpage>69</fpage>&#x02013;<lpage>82</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://novapublishers.com/shop/machiavellianism-political-strategies-psychological-dimensions-and-societal-influence/">https://novapublishers.com/shop/machiavellianism-political-strategies-psychological-dimensions-and-societal-influence/</ext-link> (Accessed December 30, 2025).</mixed-citation>
</ref>
<ref id="B64">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Gladwell</surname> <given-names>M.</given-names></name></person-group> (<year>2000</year>). <source>The Tipping Point: How Little Things Can Make a Big Difference</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Little Brown</publisher-name>.</mixed-citation>
</ref>
<ref id="B65">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Golec de Zavala</surname> <given-names>A.</given-names></name></person-group> (<year>2019</year>). <article-title>Collective narcissism and in-group satisfaction are associated with different emotional profiles and psychological wellbeing</article-title>. <source>Front. Psychol.</source> <volume>10</volume>:<fpage>203</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2019.00203</pub-id><pub-id pub-id-type="pmid">30837908</pub-id></mixed-citation>
</ref>
<ref id="B66">
<mixed-citation publication-type="web"><collab>Government of Croatia Ministry of Foreign and European Affairs.</collab> (<year>2025</year>). <source>Dubrovnik Forum: Channelling the Change. Programme. Dubrovnik, Croatia, 11&#x02013;12 July 2025</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://mvep.gov.hr/UserDocsImages/dokumenti/dubrovnik-forum/DF2025_PROGRAMME_Full%20v_11072025_19_30h.pdf">https://mvep.gov.hr/UserDocsImages/dokumenti/dubrovnik-forum/DF2025_PROGRAMME_Full%20v_11072025_19_30h.pdf</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B67">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Grier</surname> <given-names>R. A.</given-names></name></person-group> (<year>2012</year>). <article-title>Military cognitive readiness at the operational and strategic levels: a theoretical model for measurement development</article-title>. <source>J. Cogn. Eng. Decision Mak.</source> <volume>6</volume>, <fpage>358</fpage>&#x02013;<lpage>392</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1555343412444606</pub-id></mixed-citation>
</ref>
<ref id="B68">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Guo</surname> <given-names>Z.</given-names></name> <name><surname>Schlichtkrull</surname> <given-names>M.</given-names></name> <name><surname>Vlachos</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>A survey on automated fact-checking</article-title>. <source>Trans. Assoc. Computat. Linguist.</source> <volume>10</volume>, <fpage>178</fpage>&#x02013;<lpage>206</lpage>. doi: <pub-id pub-id-type="doi">10.1162/tacl_a_00454</pub-id></mixed-citation>
</ref>
<ref id="B69">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hall</surname> <given-names>J.</given-names></name> <name><surname>Werner</surname> <given-names>K.</given-names></name></person-group> (<year>2022</year>). <article-title>Trauma and trust: how war exposure shapes social and institutional trust among refugees</article-title>. <source>Front. Psychol.</source> <volume>13</volume>:<fpage>786838</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2022.786838</pub-id><pub-id pub-id-type="pmid">36051202</pub-id></mixed-citation>
</ref>
<ref id="B70">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hall</surname> <given-names>T. H.</given-names></name> <name><surname>Ross</surname> <given-names>A. A. G.</given-names></name></person-group> (<year>2015</year>). <article-title>Affective politics after 9/11</article-title>. <source>Int. Organ.</source> <volume>69</volume>, <fpage>847</fpage>&#x02013;<lpage>879</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0020818315000144</pub-id></mixed-citation>
</ref>
<ref id="B71">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Halperin</surname> <given-names>E.</given-names></name></person-group> (<year>2014</year>). <article-title>Emotion, emotion regulation, and conflict resolution</article-title>. <source>Emot. Rev.</source> <volume>6</volume>, <fpage>68</fpage>&#x02013;<lpage>76</lpage>. doi: <pub-id pub-id-type="doi">10.1177/1754073913491844</pub-id></mixed-citation>
</ref>
<ref id="B72">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Halperin</surname> <given-names>E.</given-names></name> <name><surname>Sharvit</surname> <given-names>K.</given-names></name> <name><surname>Gross</surname> <given-names>J. J.</given-names></name></person-group> (<year>2011</year>). <article-title>&#x0201C;Emotion and emotion regulation in intergroup conflict: an appraisal-based framework,&#x0201D;</article-title> in <source>Intergroup Conflicts and their Resolution</source>, ed D. Bar-Tal (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Psychology Press</publisher-name>), <fpage>83</fpage>&#x02013;<lpage>103</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.routledge.com/Intergroup-Conflicts-and-Their-Resolution-A-Social-Psychological-Perspective/Bar-Tal/p/book/9781841697833">https://www.routledge.com/Intergroup-Conflicts-and-Their-Resolution-A-Social-Psychological-Perspective/Bar-Tal/p/book/9781841697833</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B73">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Hardalov</surname> <given-names>M.</given-names></name> <name><surname>Arora</surname> <given-names>A.</given-names></name> <name><surname>Nakov</surname> <given-names>P.</given-names></name> <name><surname>Augenstein</surname> <given-names>I.</given-names></name></person-group> (<year>2022</year>). <article-title>&#x0201C;A survey on stance detection for mis-and disinformation identification,&#x0201D;</article-title> in <source>Findings of the Association for Computational Linguistics: NAACL 2022</source> (<publisher-loc>Seattle, WA</publisher-loc>: <publisher-name>Association for Computational Linguistics</publisher-name>), <fpage>1259</fpage>&#x02013;<lpage>1277</lpage>. doi: <pub-id pub-id-type="doi">10.18653/v1/2022.findings-naacl.94</pub-id></mixed-citation>
</ref>
<ref id="B74">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hasan</surname> <given-names>M.</given-names></name> <name><surname>Rundensteiner</surname> <given-names>E.</given-names></name> <name><surname>Agu</surname> <given-names>E.</given-names></name></person-group> (<year>2019</year>). <article-title>Automatic emotion detection in text streams by analyzing Twitter data</article-title>. <source>Int. J. Data Sci. Anal.</source> <volume>7</volume>, <fpage>35</fpage>&#x02013;<lpage>51</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s41060-018-0096-z</pub-id></mixed-citation>
</ref>
<ref id="B75">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hase</surname> <given-names>A.</given-names></name> <name><surname>Behnke</surname> <given-names>M.</given-names></name> <name><surname>Mazurkiewicz</surname> <given-names>M.</given-names></name> <name><surname>Wieteska</surname> <given-names>K. K.</given-names></name> <name><surname>Golec de Zavala</surname> <given-names>A.</given-names></name></person-group> (<year>2021</year>). <article-title>Distress and retaliatory aggression in response to witnessing intergroup exclusion are greater on higher levels of collective narcissism</article-title>. <source>Psychophysiology</source> <volume>58</volume>:<fpage>e13879</fpage>. doi: <pub-id pub-id-type="doi">10.1111/psyp.13879</pub-id><pub-id pub-id-type="pmid">34128555</pub-id></mixed-citation>
</ref>
<ref id="B76">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hetherington</surname> <given-names>M.</given-names></name> <name><surname>Suhay</surname> <given-names>E.</given-names></name></person-group> (<year>2011</year>). <article-title>Authoritarianism, threat, and Americans&#x00027; support for the war on terror</article-title>. <source>Am. J. Pol. Sci.</source> <volume>55</volume>, <fpage>546</fpage>&#x02013;<lpage>560</lpage>. doi: <pub-id pub-id-type="doi">10.1111/j.1540-5907.2011.00514.x</pub-id></mixed-citation>
</ref>
<ref id="B77">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Ho</surname> <given-names>P.</given-names></name> <name><surname>Kuah</surname> <given-names>A. W.</given-names></name></person-group> (<year>2014</year>). <article-title>Governing for the future: what governments can do</article-title>. <source>PRISM</source> <volume>5</volume>, <fpage>8</fpage>&#x02013;<lpage>21</lpage>.</mixed-citation>
</ref>
<ref id="B78">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Hong</surname> <given-names>J. Y.</given-names></name> <name><surname>Kang</surname> <given-names>W. C.</given-names></name></person-group> (<year>2017</year>). <article-title>Trauma and stigma: the long-term effects of wartime violence on political attitudes</article-title>. <source>Confl. Manage. Peace Sci.</source> <volume>34</volume>, <fpage>264</fpage>&#x02013;<lpage>286</lpage>. doi: <pub-id pub-id-type="doi">10.1177/0738894215593683</pub-id></mixed-citation>
</ref>
<ref id="B79">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>H.</given-names></name> <name><surname>Zhang</surname> <given-names>D.</given-names></name> <name><surname>Xiao</surname> <given-names>F.</given-names></name> <name><surname>Wang</surname> <given-names>K.</given-names></name> <name><surname>Gu</surname> <given-names>J.</given-names></name> <name><surname>Wang</surname> <given-names>R.</given-names></name></person-group> (<year>2020</year>). <article-title>Privacy-preserving approach PBCN in social network with differential privacy</article-title>. <source>IEEE Trans. Netw. Serv. Manage.</source> <volume>17</volume>, <fpage>931</fpage>&#x02013;<lpage>945</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TNSM.2020.2982555</pub-id></mixed-citation>
</ref>
<ref id="B80">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Huang</surname> <given-names>L.</given-names></name> <name><surname>Shi</surname> <given-names>P.</given-names></name> <name><surname>Zhu</surname> <given-names>H.</given-names></name> <name><surname>Chen</surname> <given-names>T.</given-names></name></person-group> (<year>2022</year>). <article-title>Early detection of emergency events from social media: a new text clustering approach</article-title>. <source>Nat. Hazards</source> <volume>111</volume>, <fpage>851</fpage>&#x02013;<lpage>875</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11069-021-05081-1</pub-id><pub-id pub-id-type="pmid">35095194</pub-id></mixed-citation>
</ref>
<ref id="B81">
<mixed-citation publication-type="web"><collab>Innovative Data Intelligence Research Laboratory</collab> (<year>n.d.</year>). <source>ClaimBuster: Automated Live Fact-Checking</source>. The University of Texas at Arlington. Available online at: <ext-link ext-link-type="uri" xlink:href="https://idir.uta.edu/claimbuster/">https://idir.uta.edu/claimbuster/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B82">
<mixed-citation publication-type="web"><collab>Institute of Medicine (U.S.) Committee on a National Neural Circuitry Database</collab> (<year>1991</year>). <source>Mapping the Brain and Its Functions: Integrating Enabling Technologies into Neuroscience Research</source>, eds <person-group person-group-type="editor"><name><surname>Pechura</surname> <given-names>C. M.</given-names></name> and <name><surname>Martin</surname> <given-names>J. B.</given-names></name></person-group> (<publisher-loc>Washington, DC</publisher-loc>: <publisher-name>National Academies Press</publisher-name>). Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.nationalacademies.org/publications/1816">https://www.nationalacademies.org/publications/1816</ext-link> (Accessed December 30, 2025).</mixed-citation>
</ref>
<ref id="B83">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Islam</surname> <given-names>M. R.</given-names></name> <name><surname>Liu</surname> <given-names>S.</given-names></name> <name><surname>Wang</surname> <given-names>X.</given-names></name> <name><surname>Xu</surname> <given-names>G.</given-names></name></person-group> (<year>2020</year>). <article-title>Deep learning for misinformation detection on online social networks: a survey and new perspectives</article-title>. <source>Soc. Netw. Anal. Mining</source> <volume>10</volume>:<fpage>82</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s13278-020-00696-x</pub-id><pub-id pub-id-type="pmid">33014173</pub-id></mixed-citation>
</ref>
<ref id="B84">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jarymowicz</surname> <given-names>M.</given-names></name> <name><surname>Bar-Tal</surname> <given-names>D.</given-names></name></person-group> (<year>2006</year>). <article-title>The dominance of fear over hope in the life of individuals and collectives</article-title>. <source>Eur. J. Soc. Psychol.</source> <volume>36</volume>, <fpage>367</fpage>&#x02013;<lpage>392</lpage>. doi: <pub-id pub-id-type="doi">10.1002/ejsp.302</pub-id></mixed-citation>
</ref>
<ref id="B85">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jiang</surname> <given-names>C.</given-names></name> <name><surname>Rau</surname> <given-names>P. L. P.</given-names></name></person-group> (<year>2017</year>). <article-title>Working memory performance impaired after exposure to acute social stress: the evidence comes from ERPs</article-title>. <source>Neurosci. Lett.</source> <volume>658</volume>, <fpage>137</fpage>&#x02013;<lpage>141</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neulet.2017.08.054</pub-id><pub-id pub-id-type="pmid">28851617</pub-id></mixed-citation>
</ref>
<ref id="B86">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Jost</surname> <given-names>J. T.</given-names></name> <name><surname>Amodio</surname> <given-names>D. M.</given-names></name></person-group> (<year>2012</year>). <article-title>Political ideology as motivated social cognition: behavioral and neuroscientific evidence</article-title>. <source>Motiv. Emot.</source> <volume>36</volume>, <fpage>55</fpage>&#x02013;<lpage>64</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11031-011-9260-7</pub-id></mixed-citation>
</ref>
<ref id="B87">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Keith Norambuena</surname> <given-names>B. F.</given-names></name> <name><surname>Mitra</surname> <given-names>T.</given-names></name></person-group> (<year>2021</year>). <article-title>Narrative maps: an algorithmic approach to represent and extract information narratives</article-title>. <source>Proc. ACM Hum. Comput. Interact.</source> <volume>4</volume>, <fpage>1</fpage>&#x02013;<lpage>33</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3432927</pub-id></mixed-citation>
</ref>
<ref id="B88">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>K&#x000FC;&#x000E7;&#x000FC;k</surname> <given-names>D.</given-names></name> <name><surname>Can</surname> <given-names>F.</given-names></name></person-group> (<year>2020</year>). <article-title>Stance detection: a survey</article-title>. <source>ACM Comput. Surv.</source> <volume>53</volume>, <fpage>1</fpage>&#x02013;<lpage>37</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3369026</pub-id></mixed-citation>
</ref>
<ref id="B89">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lahmann</surname> <given-names>H.</given-names></name> <name><surname>Custers</surname> <given-names>B.</given-names></name> <name><surname>Scott</surname> <given-names>B. I.</given-names></name></person-group> (<year>2025</year>). <article-title>The fundamental rights risks of countering cognitive warfare with artificial intelligence</article-title>. <source>Ethics Inf. Technol.</source> <volume>27</volume>:<fpage>49</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s10676-025-09868-9</pub-id><pub-id pub-id-type="pmid">41064132</pub-id></mixed-citation>
</ref>
<ref id="B90">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>LeDoux</surname> <given-names>J.</given-names></name></person-group> (<year>1996</year>). <source>The Emotional Brain: The Mysterious Underpinnings of Emotional Life</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Simon and Schuster</publisher-name>.</mixed-citation>
</ref>
<ref id="B91">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lees</surname> <given-names>A.</given-names></name> <name><surname>Tran</surname> <given-names>V. Q.</given-names></name> <name><surname>Tay</surname> <given-names>Y.</given-names></name> <name><surname>Sorensen</surname> <given-names>J.</given-names></name> <name><surname>Gupta</surname> <given-names>J.</given-names></name> <name><surname>Metzler</surname> <given-names>D.</given-names></name> <etal/></person-group>. (<year>2022</year>). <article-title>&#x0201C;A new generation of perspective API: efficient multilingual character-level transformers,&#x0201D;</article-title> in <source>Proceedings of the 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name>), <fpage>3197</fpage>&#x02013;<lpage>3207</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3534678.3539147</pub-id></mixed-citation>
</ref>
<ref id="B92">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lerner</surname> <given-names>J. S.</given-names></name> <name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Valdesolo</surname> <given-names>P.</given-names></name> <name><surname>Kassam</surname> <given-names>K. S.</given-names></name></person-group> (<year>2015</year>). <article-title>Emotion and decision making</article-title>. <source>Annu. Rev. Psychol.</source> <volume>66</volume>, <fpage>799</fpage>&#x02013;<lpage>823</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev-psych-010213-115043</pub-id><pub-id pub-id-type="pmid">25251484</pub-id></mixed-citation>
</ref>
<ref id="B93">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lewandowsky</surname> <given-names>S.</given-names></name> <name><surname>van der Linden</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <article-title>Countering misinformation and fake news through inoculation and prebunking</article-title>. <source>Euro. Rev. Soc. Psychol.</source> <volume>32</volume>, <fpage>348</fpage>&#x02013;<lpage>384</lpage>. doi: <pub-id pub-id-type="doi">10.1080/10463283.2021.1876983</pub-id></mixed-citation>
</ref>
<ref id="B94">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Lewis</surname> <given-names>J.</given-names></name> <name><surname>Marsden</surname> <given-names>S.</given-names></name> <name><surname>Hewitt</surname> <given-names>J.</given-names></name> <name><surname>Peterscheck</surname> <given-names>A. V.</given-names></name></person-group> (<year>2024</year>). <source>Trauma, Adversity and Violent Extremism: A Systematic Review</source>. CREST (Centre for Research and Evidence on Security Threats). Available online at: <ext-link ext-link-type="uri" xlink:href="https://crestresearch.ac.uk/resources/trauma-adversity-violent-extremism-systematic-review/">https://crestresearch.ac.uk/resources/trauma-adversity-violent-extremism-systematic-review/</ext-link> (Accessed December 30, 2025).</mixed-citation>
</ref>
<ref id="B95">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Li</surname> <given-names>Y.</given-names></name> <name><surname>Sosea</surname> <given-names>T.</given-names></name> <name><surname>Sawant</surname> <given-names>A.</given-names></name> <name><surname>Nair</surname> <given-names>A. J.</given-names></name> <name><surname>Inkpen</surname> <given-names>D.</given-names></name> <name><surname>Caragea</surname> <given-names>C.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x0201C;P-stance: A large dataset for stance detection in political domain,&#x0201D;</article-title> in <source>Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021</source> (<publisher-loc>Association for Computational Linguistics</publisher-loc>), <fpage>2355</fpage>&#x02013;<lpage>2365</lpage>. doi: <pub-id pub-id-type="doi">10.18653/v1/2021.findings-acl.208</pub-id></mixed-citation>
</ref>
<ref id="B96">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Limaj</surname> <given-names>E.</given-names></name> <name><surname>Yaroshenko</surname> <given-names>O. M.</given-names></name> <name><surname>Melnychuk</surname> <given-names>N. O.</given-names></name> <name><surname>Moskalenko</surname> <given-names>O. V.</given-names></name> <name><surname>Chung</surname> <given-names>J. K.</given-names></name></person-group> (<year>2024</year>). <article-title>The trauma of war: implications for future generations in Ukraine (comparison with the Eastern European countries that were at war at the end of the 20th century)</article-title>. <source>Int. J. Environ. Stud.</source> <volume>81</volume>, <fpage>111</fpage>&#x02013;<lpage>124</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00207233.2023.2267388</pub-id></mixed-citation>
</ref>
<ref id="B97">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Lindner</surname> <given-names>E.</given-names></name></person-group> (<year>2009</year>). <source>Emotion and Conflict: How Human Rights Can Dignify Emotion and Help Us Wage Good Conflict</source>. <publisher-loc>Westport, CT</publisher-loc>: <publisher-name>Praeger</publisher-name>. doi: <pub-id pub-id-type="doi">10.5040/9798400645228</pub-id></mixed-citation>
</ref>
<ref id="B98">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Lodge</surname> <given-names>M.</given-names></name> <name><surname>Taber</surname> <given-names>C. S.</given-names></name></person-group> (<year>2013</year>). <source>The Rationalizing Voter</source>. Cambridge: Cambridge University Press. doi: <pub-id pub-id-type="doi">10.1017/CBO9781139032490</pub-id></mixed-citation>
</ref>
<ref id="B99">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Marcus</surname> <given-names>G. E.</given-names></name> <name><surname>Neuman</surname> <given-names>W. R.</given-names></name> <name><surname>MacKuen</surname> <given-names>M.</given-names></name></person-group> (<year>2000</year>). <source>Affective Intelligence and Political Judgment</source>. <publisher-loc>Chicago, IL</publisher-loc>: <publisher-name>University of Chicago Press</publisher-name>.</mixed-citation>
</ref>
<ref id="B100">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Marigliano</surname> <given-names>R.</given-names></name> <name><surname>Ng</surname> <given-names>L. H. X.</given-names></name> <name><surname>Carley</surname> <given-names>K. M.</given-names></name></person-group> (<year>2024</year>). <article-title>Analyzing digital propaganda and conflict rhetoric: a study on Russia&#x00027;s bot-driven campaigns and counter-narratives during the Ukraine crisis</article-title>. <source>Soc. Netw. Anal. Mining</source> <volume>14</volume>:<fpage>170</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s13278-024-01322-w</pub-id></mixed-citation>
</ref>
<ref id="B101">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Marjanovi&#x00107;</surname> <given-names>A.</given-names></name> <name><surname>Smiljani&#x00107;</surname> <given-names>D.</given-names></name></person-group> (<year>2025</year>). <article-title>&#x0201C;Cognitive warfare&#x02013;the human mind as the new battlefield,&#x0201D;</article-title> in <source>Proceedings of the Defense and Security Conference</source> (<publisher-loc>Zagreb</publisher-loc>: <publisher-name>Sveu&#x0010D;ili&#x00161;te obrane i sigurnosti &#x0201C;Dr. Franjo Tudman&#x0201D;</publisher-name>), <fpage>84</fpage>&#x02013;<lpage>114</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.researchgate.net/publication/391704397_Cognitive_warfare_-_the_human_mind_as_the_new_battlefield">https://www.researchgate.net/publication/391704397_Cognitive_warfare_-_the_human_mind_as_the_new_battlefield</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B102">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Martel</surname> <given-names>C.</given-names></name> <name><surname>Pennycook</surname> <given-names>G.</given-names></name> <name><surname>Rand</surname> <given-names>D. G.</given-names></name></person-group> (<year>2020</year>). <article-title>Reliance on emotion promotes belief in fake news</article-title>. <source>Cogn. Res. Principles Impl.</source> <volume>5</volume>:<fpage>47</fpage>. doi: <pub-id pub-id-type="doi">10.1186/s41235-020-00252-3</pub-id><pub-id pub-id-type="pmid">33026546</pub-id></mixed-citation>
</ref>
<ref id="B103">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McCreight</surname> <given-names>R.</given-names></name></person-group> (<year>2024</year>). <article-title>The war inside your mind: Unprotected brain battlefields and neuro-vulnerability</article-title>. <source>Acad. Biol.</source> <volume>2</volume>, <fpage>1</fpage>&#x02013;<lpage>9</lpage>. doi: <pub-id pub-id-type="doi">10.20935/AcadBiol6156</pub-id></mixed-citation>
</ref>
<ref id="B104">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McDermott</surname> <given-names>R.</given-names></name></person-group> (<year>2004</year>). <article-title>The feeling of rationality: the meaning of neuroscientific advances for political science</article-title>. <source>Perspect. Polit.</source> <volume>2</volume>, <fpage>691</fpage>&#x02013;<lpage>706</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S1537592704040459</pub-id></mixed-citation>
</ref>
<ref id="B105">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>McEwen</surname> <given-names>B. S.</given-names></name> <name><surname>Morrison</surname> <given-names>J. H.</given-names></name></person-group> (<year>2013</year>). <article-title>The brain on stress: vulnerability and plasticity of the prefrontal cortex over the life course</article-title>. <source>Neuron</source> <volume>79</volume>, <fpage>16</fpage>&#x02013;<lpage>29</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neuron.2013.06.028</pub-id><pub-id pub-id-type="pmid">23849196</pub-id></mixed-citation>
</ref>
<ref id="B106">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Meichenbaum</surname> <given-names>D.</given-names></name></person-group> (<year>2017</year>). <article-title>&#x0201C;Stress inoculation training: a preventative and treatment approach,&#x0201D;</article-title> in <source>The Evolution of Cognitive Behavior Therapy</source>, ed D. Meichenbaum (New York, NY: Routledge), <fpage>101</fpage>&#x02013;<lpage>124</lpage>. doi: <pub-id pub-id-type="doi">10.4324/9781315748931-10</pub-id></mixed-citation>
</ref>
<ref id="B107">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mercer</surname> <given-names>J.</given-names></name></person-group> (<year>2010</year>). <article-title>Emotional beliefs</article-title>. <source>Int. Organ.</source> <volume>64</volume>, <fpage>1</fpage>&#x02013;<lpage>31</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0020818309990221</pub-id></mixed-citation>
</ref>
<ref id="B108">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Merle</surname> <given-names>R.</given-names></name></person-group> (<year>2005</year>). <article-title>Pentagon funds diplomacy effort</article-title>. <source>Washington Post</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.washingtonpost.com/archive/business/2005/06/11/pentagon-funds-diplomacy-effort/b33ed82c-2ff5-4ed0-874b-63c5098e5d6c/">https://www.washingtonpost.com/archive/business/2005/06/11/pentagon-funds-diplomacy-effort/b33ed82c-2ff5-4ed0-874b-63c5098e5d6c/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B109">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mohammad</surname> <given-names>S. M.</given-names></name></person-group> (<year>2016</year>). <article-title>&#x0201C;Sentiment analysis: detecting valence, emotions, and other affectual states from text,&#x0201D;</article-title> in <source>Emotion Measurement</source>, ed H. L. Meiselman (Duxford: Woodhead Publishing), <fpage>201</fpage>&#x02013;<lpage>237</lpage>. doi: <pub-id pub-id-type="doi">10.1016/B978-0-08-100508-8.00009-6</pub-id></mixed-citation>
</ref>
<ref id="B110">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Mohammed</surname> <given-names>R.</given-names></name> <name><surname>Neuner</surname> <given-names>F.</given-names></name></person-group> (<year>2022</year>). <article-title>War trauma, mental health, aggression, and violent-extremism among former ISIS terrorists</article-title>. <source>J. Affect. Disord. Rep.</source> <volume>10</volume>:<fpage>100399</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.jadr.2022.100399</pub-id></mixed-citation>
</ref>
<ref id="B111">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Moreno</surname> <given-names>J. D.</given-names></name></person-group> (<year>2012</year>). <source>Mind Wars: Brain Science and the Military in the 21st Century</source>. <publisher-loc>New York, NY</publisher-loc>: <publisher-name>Bellevue Literary Press</publisher-name>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.blpress.org/books/mind-wars/">https://www.blpress.org/books/mind-wars/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B112">
<mixed-citation publication-type="web"><collab>MVEPRH</collab> (<year>2025</year>). <source>Dubrovnik Forum 2025 - Saturday, July 12</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.youtube.com/watch?v=EyNMeH0rVpk">https://www.youtube.com/watch?v=EyNMeH0rVpk</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B113">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nandwani</surname> <given-names>P.</given-names></name> <name><surname>Verma</surname> <given-names>R.</given-names></name></person-group> (<year>2021</year>). <article-title>A review on sentiment analysis and emotion detection from text</article-title>. <source>Soc. Netw. Anal. Mining</source> <volume>11</volume>:<fpage>81</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s13278-021-00776-6</pub-id><pub-id pub-id-type="pmid">34484462</pub-id></mixed-citation>
</ref>
<ref id="B114">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Narula</surname> <given-names>S.</given-names></name></person-group> (<year>2004</year>). <article-title>Psychological operations (PSYOPs): a conceptual overview</article-title>. <source>Strategic Anal.</source> <volume>28</volume>, <fpage>177</fpage>&#x02013;<lpage>192</lpage>. doi: <pub-id pub-id-type="doi">10.1080/09700160408450124</pub-id></mixed-citation>
</ref>
<ref id="B115">
<mixed-citation publication-type="web"><collab>NATO</collab> (<year>2022</year>). <source>NATO 2022 Strategic Concept: Adopted by Heads of State and Government at the NATO Summit in Madrid 29 June 2022</source>. Brussels: NATO. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.nato.int/en/about-us/official-texts-and-resources/strategic-concepts/nato-2022-strategic-concept">https://www.nato.int/en/about-us/official-texts-and-resources/strategic-concepts/nato-2022-strategic-concept</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B116">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Nye</surname> <given-names>J. S.</given-names></name></person-group> (<year>1990</year>). <article-title>Soft power</article-title>. <source>Foreign Policy</source> <volume>80</volume>, <fpage>153</fpage>&#x02013;<lpage>171</lpage>. doi: <pub-id pub-id-type="doi">10.2307/1148580</pub-id></mixed-citation>
</ref>
<ref id="B117">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>O&#x00027;Reilly</surname> <given-names>C. A.</given-names></name> <name><surname>Hall</surname> <given-names>N.</given-names></name></person-group> (<year>2021</year>). <article-title>Grandiose narcissists and decision making: impulsive, overconfident, and skeptical of experts&#x02013;but seldom in doubt</article-title>. <source>Pers. Individ. Dif.</source> <volume>168</volume>:<fpage>110280</fpage>. doi: <pub-id pub-id-type="doi">10.1016/j.paid.2020.110280</pub-id><pub-id pub-id-type="pmid">32834287</pub-id></mixed-citation>
</ref>
<ref id="B118">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Overney</surname> <given-names>C.</given-names></name> <name><surname>Jiang</surname> <given-names>H.</given-names></name> <name><surname>Haider</surname> <given-names>U.</given-names></name> <name><surname>Moe</surname> <given-names>C.</given-names></name> <name><surname>Mangat</surname> <given-names>J.</given-names></name> <name><surname>Pantano</surname> <given-names>F.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>Human-AI narrative synthesis to foster shared understanding in civic decision-making</article-title>. <source>arXiv</source> [Preprint] arXiv:2509.19643.</mixed-citation>
</ref>
<ref id="B119">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Owen</surname> <given-names>D.</given-names></name> <name><surname>Davidson</surname> <given-names>J.</given-names></name></person-group> (<year>2009</year>). <article-title>Hubris syndrome: an acquired personality disorder? A study of US Presidents and UK Prime Ministers over the last 100 years</article-title>. <source>Brain</source> <volume>132</volume>, <fpage>1396</fpage>&#x02013;<lpage>1406</lpage>. doi: <pub-id pub-id-type="doi">10.1093/brain/awp008</pub-id><pub-id pub-id-type="pmid">19213778</pub-id></mixed-citation>
</ref>
<ref id="B120">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Oxley</surname> <given-names>D. R.</given-names></name> <name><surname>Smith</surname> <given-names>K. B.</given-names></name> <name><surname>Alford</surname> <given-names>J. R.</given-names></name> <name><surname>Hibbing</surname> <given-names>M. V.</given-names></name> <name><surname>Miller</surname> <given-names>J. L.</given-names></name> <name><surname>Scalora</surname> <given-names>M.</given-names></name> <etal/></person-group>. (<year>2008</year>). <article-title>Political attitudes vary with physiological traits</article-title>. <source>Science</source> <volume>321</volume>, <fpage>1667</fpage>&#x02013;<lpage>1670</lpage>. doi: <pub-id pub-id-type="doi">10.1126/science.1157627</pub-id><pub-id pub-id-type="pmid">18801995</pub-id></mixed-citation>
</ref>
<ref id="B121">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Pacheco</surname> <given-names>D.</given-names></name> <name><surname>Hui</surname> <given-names>P. M.</given-names></name> <name><surname>Torres-Lugo</surname> <given-names>C.</given-names></name> <name><surname>Truong</surname> <given-names>B. T.</given-names></name> <name><surname>Flammini</surname> <given-names>A.</given-names></name> <name><surname>Menczer</surname> <given-names>F.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x0201C;Uncovering coordinated networks on social media: methods and case studies,&#x0201D;</article-title> in <source>Proceedings of the International AAAI Conference on Web and Social Media</source>, Vol. 15 (Palo Alto, CA), <fpage>455</fpage>&#x02013;<lpage>466</lpage>. doi: <pub-id pub-id-type="doi">10.1609/icwsm.v15i1.18075</pub-id></mixed-citation>
</ref>
<ref id="B122">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Paluck</surname> <given-names>E. L.</given-names></name></person-group> (<year>2009</year>). <article-title>Reducing intergroup prejudice and conflict using the media: a field experiment in Rwanda</article-title>. <source>J. Pers. Soc. Psychol.</source> <volume>96</volume>, <fpage>574</fpage>&#x02013;<lpage>587</lpage>. doi: <pub-id pub-id-type="doi">10.1037/a0011989</pub-id><pub-id pub-id-type="pmid">19254104</pub-id></mixed-citation>
</ref>
<ref id="B123">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Paluck</surname> <given-names>E. L.</given-names></name> <name><surname>Green</surname> <given-names>D. P.</given-names></name></person-group> (<year>2009</year>). <article-title>Deference, dissent, and dispute resolution: An experimental intervention using mass media to change norms and behavior in Rwanda</article-title>. <source>Am. Polit. Sci. Rev.</source> <volume>103</volume>, <fpage>622</fpage>&#x02013;<lpage>644</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0003055409990128</pub-id></mixed-citation>
</ref>
<ref id="B124">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Patil</surname> <given-names>A. J.</given-names></name> <name><surname>Deshpande</surname> <given-names>A.</given-names></name></person-group> (<year>2022</year>). <article-title>&#x0201C;A comprehensive review on social botnet detection techniques,&#x0201D;</article-title> in <source>2022 International Conference on Augmented Intelligence and Sustainable Systems (ICAISS)</source> (<publisher-loc>Piscataway, NJ</publisher-loc>: <publisher-name>IEEE</publisher-name>), <fpage>950</fpage>&#x02013;<lpage>957</lpage>. doi: <pub-id pub-id-type="doi">10.1109/ICAISS55157.2022.10010877</pub-id></mixed-citation>
</ref>
<ref id="B125">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Plowman</surname> <given-names>K. D.</given-names></name> <name><surname>Walton</surname> <given-names>S. B.</given-names></name></person-group> (<year>2020</year>). <article-title>Negotiating public policy: are there roles for the media and public relations?</article-title> <source>J. Public Affairs</source> <volume>20</volume>:<fpage>e2148</fpage>. doi: <pub-id pub-id-type="doi">10.1002/pa.2148</pub-id></mixed-citation>
</ref>
<ref id="B126">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Porcelli</surname> <given-names>A. J.</given-names></name> <name><surname>Delgado</surname> <given-names>M. R.</given-names></name></person-group> (<year>2017</year>). <article-title>Stress and decision making: effects on valuation, learning, and risk-taking</article-title>. <source>Curr. Opin. Behav. Sci.</source> <volume>14</volume>, <fpage>33</fpage>&#x02013;<lpage>39</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.cobeha.2016.11.015</pub-id><pub-id pub-id-type="pmid">28044144</pub-id></mixed-citation>
</ref>
<ref id="B127">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Posner</surname> <given-names>J.</given-names></name> <name><surname>Russell</surname> <given-names>J. A.</given-names></name> <name><surname>Peterson</surname> <given-names>B. S.</given-names></name></person-group> (<year>2005</year>). <article-title>The circumplex model of affect: an integrative approach to affective neuroscience, cognitive development, and psychopathology</article-title>. <source>Dev. Psychopathol.</source> <volume>17</volume>, <fpage>715</fpage>&#x02013;<lpage>734</lpage>. doi: <pub-id pub-id-type="doi">10.1017/S0954579405050340</pub-id><pub-id pub-id-type="pmid">16262989</pub-id></mixed-citation>
</ref>
<ref id="B128">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Raji</surname> <given-names>I. D.</given-names></name> <name><surname>Smart</surname> <given-names>A.</given-names></name> <name><surname>White</surname> <given-names>R. N.</given-names></name> <name><surname>Mitchell</surname> <given-names>M.</given-names></name> <name><surname>Gebru</surname> <given-names>T.</given-names></name> <name><surname>Hutchinson</surname> <given-names>B.</given-names></name> <etal/></person-group>. (<year>2020</year>). <article-title>&#x0201C;Closing the AI accountability gap: defining an end-to-end framework for internal algorithmic auditing,&#x0201D;</article-title> in <source>Proceedings of the 2020 Conference on Fairness, Accountability, and Transparency</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name>), <fpage>33</fpage>&#x02013;<lpage>44</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3351095.3372873</pub-id></mixed-citation>
</ref>
<ref id="B129">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Renna</surname> <given-names>M. E.</given-names></name> <name><surname>Quintero</surname> <given-names>J. M.</given-names></name> <name><surname>Fresco</surname> <given-names>D. M.</given-names></name> <name><surname>Mennin</surname> <given-names>D. S.</given-names></name></person-group> (<year>2017</year>). <article-title>Emotion regulation therapy: a mechanism-targeted treatment for disorders of distress</article-title>. <source>Front. Psychol.</source> <volume>8</volume>:<fpage>98</fpage>. doi: <pub-id pub-id-type="doi">10.3389/fpsyg.2017.00098</pub-id><pub-id pub-id-type="pmid">28220089</pub-id></mixed-citation>
</ref>
<ref id="B130">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Reuter</surname> <given-names>C.</given-names></name> <name><surname>Lee Hughes</surname> <given-names>A.</given-names></name> <name><surname>Buntain</surname> <given-names>C.</given-names></name></person-group> (<year>2025</year>). <article-title>Combating information warfare: state and trends in user-centred countermeasures against fake news and misinformation</article-title>. <source>Behav. Inf. Technol.</source> <volume>44</volume>, <fpage>3348</fpage>&#x02013;<lpage>3361</lpage>. doi: <pub-id pub-id-type="doi">10.1080/0144929X.2024.2442486</pub-id></mixed-citation>
</ref>
<ref id="B131">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Riva</surname> <given-names>G.</given-names></name> <name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name> <name><surname>Cipresso</surname> <given-names>P.</given-names></name></person-group> (<year>2025</year>). <article-title>Humane artificial intelligence: psychological, social, and ethical dimensions</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>28</volume>, <fpage>457</fpage>&#x02013;<lpage>461</lpage> doi: <pub-id pub-id-type="doi">10.1089/cyber.2025.0202</pub-id><pub-id pub-id-type="pmid">40501330</pub-id></mixed-citation>
</ref>
<ref id="B132">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>R&#x000F8;d</surname> <given-names>B.</given-names></name> <name><surname>Pursiainen</surname> <given-names>C.</given-names></name> <name><surname>Eklund</surname> <given-names>N.</given-names></name></person-group> (<year>2025</year>). <article-title>Combatting disinformation &#x02013; how do we create resilient societies? Literature review and analytical framework</article-title>. <source>Euro. J. Secur. Res.</source> <volume>10</volume>, <fpage>1</fpage>&#x02013;<lpage>42</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s41125-025-00105-4</pub-id></mixed-citation>
</ref>
<ref id="B133">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Rodenh&#x000E4;user</surname> <given-names>T.</given-names></name></person-group> (<year>2023</year>). <article-title>The legal boundaries of (digital) information or psychological operations under International Humanitarian Law</article-title>. <source>Int. Law Stud.</source> <volume>100</volume>, <fpage>541</fpage>&#x02013;<lpage>573</lpage>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=3054&#x00026;context=ils">https://digital-commons.usnwc.edu/cgi/viewcontent.cgi?article=3054&#x00026;context=ils</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B134">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Roozenbeek</surname> <given-names>J.</given-names></name> <name><surname>van der Linden</surname> <given-names>S.</given-names></name></person-group> (<year>2021</year>). <source>Inoculation Theory and Misinformation</source>. Riga: NATO Strategic Communications Centre of Excellence. Available online at: <ext-link ext-link-type="uri" xlink:href="https://stratcomcoe.org/publications/inoculation-theory-and-misinformation/217">https://stratcomcoe.org/publications/inoculation-theory-and-misinformation/217</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B135">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Rosado</surname> <given-names>D.</given-names></name> <name><surname>Hughes</surname> <given-names>R.</given-names></name> <name><surname>Halberstadt</surname> <given-names>J.</given-names></name></person-group> (<year>2022</year>). <article-title>Longitudinal analysis of sentiment and emotion in news media headlines using automated labelling with transformer language models</article-title>. <source>PLoS ONE</source> <volume>17</volume>:<fpage>e0276367</fpage>. doi: <pub-id pub-id-type="doi">10.1371/journal.pone.0276367</pub-id><pub-id pub-id-type="pmid">36256658</pub-id></mixed-citation>
</ref>
<ref id="B136">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Roseman</surname> <given-names>I. J.</given-names></name></person-group> (<year>1991</year>). <article-title>Appraisal determinants of discrete emotions</article-title>. <source>Cogn. Emot.</source> <volume>5</volume>, <fpage>161</fpage>&#x02013;<lpage>200</lpage>. doi: <pub-id pub-id-type="doi">10.1080/02699939108411034</pub-id></mixed-citation>
</ref>
<ref id="B137">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Russell</surname> <given-names>J. A.</given-names></name></person-group> (<year>1980</year>). <article-title>A circumplex model of affect</article-title>. <source>J. Pers. Soc. Psychol.</source> <volume>39</volume>, <fpage>1161</fpage>&#x02013;<lpage>1178</lpage>. doi: <pub-id pub-id-type="doi">10.1037/h0077714</pub-id></mixed-citation>
</ref>
<ref id="B138">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Salzman</surname> <given-names>C. D.</given-names></name> <name><surname>Fusi</surname> <given-names>S.</given-names></name></person-group> (<year>2010</year>). <article-title>Emotion, cognition, and mental state representation in amygdala and prefrontal cortex</article-title>. <source>Annu. Rev. Neurosci.</source> <volume>33</volume>, <fpage>173</fpage>&#x02013;<lpage>202</lpage>. doi: <pub-id pub-id-type="doi">10.1146/annurev.neuro.051508.135256</pub-id><pub-id pub-id-type="pmid">20331363</pub-id></mixed-citation>
</ref>
<ref id="B139">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Santana</surname> <given-names>B.</given-names></name> <name><surname>Campos</surname> <given-names>R.</given-names></name> <name><surname>Amorim</surname> <given-names>E.</given-names></name> <name><surname>Jorge</surname> <given-names>A.</given-names></name> <name><surname>Silvano</surname> <given-names>P.</given-names></name> <name><surname>Nunes</surname> <given-names>S.</given-names></name></person-group> (<year>2023</year>). <article-title>A survey on narrative extraction from textual data</article-title>. <source>Artif. Intell. Rev.</source> <volume>56</volume>, <fpage>8393</fpage>&#x02013;<lpage>8435</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s10462-022-10338-7</pub-id></mixed-citation>
</ref>
<ref id="B140">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Scharbert</surname> <given-names>J.</given-names></name> <name><surname>Humberg</surname> <given-names>S.</given-names></name> <name><surname>Kroencke</surname> <given-names>L.</given-names></name> <name><surname>Reiter</surname> <given-names>T.</given-names></name> <name><surname>Sakel</surname> <given-names>S.</given-names></name> <name><surname>Ter Horst</surname> <given-names>J.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>Psychological well-being in Europe after the outbreak of war in Ukraine</article-title>. <source>Nat. Commun.</source> <volume>15</volume>:<fpage>1202</fpage>. doi: <pub-id pub-id-type="doi">10.1038/s41467-024-44693-6</pub-id><pub-id pub-id-type="pmid">38378761</pub-id></mixed-citation>
</ref>
<ref id="B141">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Schmitt</surname> <given-names>M. N.</given-names></name> (ed.).</person-group> (<year>2017</year>). <source>Tallinn Manual 2.0 on the International Law Applicable to Cyber Operations</source>. <publisher-loc>Cambridge</publisher-loc>: <publisher-name>Cambridge University Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.1017/9781316822524</pub-id></mixed-citation>
</ref>
<ref id="B142">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Sharma</surname> <given-names>K.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Ferrara</surname> <given-names>E.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name></person-group> (<year>2021</year>). <article-title>&#x0201C;Identifying coordinated accounts on social media through hidden influence and group behaviours,&#x0201D;</article-title> in <source>Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining</source> (<publisher-loc>New York, NY</publisher-loc>: <publisher-name>Association for Computing Machinery</publisher-name>), <fpage>1441</fpage>&#x02013;<lpage>1451</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3447548.3467391</pub-id></mixed-citation>
</ref>
<ref id="B143">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Sheikhi</surname> <given-names>G.</given-names></name> <name><surname>Touileb</surname> <given-names>S.</given-names></name> <name><surname>Khan</surname> <given-names>S. A.</given-names></name></person-group> (<year>2023</year>). <article-title>&#x0201C;Automated claim detection for fact-checking: a case study using Norwegian pre-trained language models,&#x0201D;</article-title> in <source>Proceedings of the 24th Nordic Conference on Computational Linguistics (NoDaLiDa)</source>. Available online at: <ext-link ext-link-type="uri" xlink:href="https://aclanthology.org/2023.nodalida-1.1/">https://aclanthology.org/2023.nodalida-1.1/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B144">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Sheridan</surname> <given-names>T. B.</given-names></name> <name><surname>Verplank</surname> <given-names>W. L.</given-names></name></person-group> (<year>1978</year>). <source>Human and Computer Control of Undersea Teleoperators. Man-Machine Systems Laboratory Report</source>. <publisher-loc>Cambridge, MA</publisher-loc>: <publisher-name>MIT Press</publisher-name>. doi: <pub-id pub-id-type="doi">10.21236/ADA057655</pub-id></mixed-citation>
</ref>
<ref id="B145">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Shields</surname> <given-names>G. S.</given-names></name> <name><surname>Sazma</surname> <given-names>M. A.</given-names></name> <name><surname>Yonelinas</surname> <given-names>A. P.</given-names></name></person-group> (<year>2016</year>). <article-title>The effects of acute stress on core executive functions: a meta-analysis and comparison with cortisol</article-title>. <source>Neurosci. Biobehav. Rev.</source> <volume>68</volume>, <fpage>651</fpage>&#x02013;<lpage>668</lpage>. doi: <pub-id pub-id-type="doi">10.1016/j.neubiorev.2016.06.038</pub-id><pub-id pub-id-type="pmid">27371161</pub-id></mixed-citation>
</ref>
<ref id="B146">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Stanley</surname> <given-names>E. A.</given-names></name></person-group> (<year>2014</year>). <article-title>&#x0201C;Mindfulness-based mind fitness training: an approach for enhancing performance and building resilience in high-stress contexts,&#x0201D;</article-title> in <source>The Wiley Blackwell Handbook of Mindfulness</source>, eds <person-group person-group-type="editor"><name><surname>Ie</surname> <given-names>A.</given-names></name> <name><surname>Ngnoumen</surname> <given-names>C. T.</given-names></name> <name><surname>Langer</surname> <given-names>E. J.</given-names></name></person-group> (<publisher-loc>Chichester</publisher-loc>: <publisher-name>John Wiley &#x00026; Sons</publisher-name>), <fpage>964</fpage>&#x02013;<lpage>985</lpage>. doi: <pub-id pub-id-type="doi">10.1002/9781118294895.ch50</pub-id></mixed-citation>
</ref>
<ref id="B147">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Stella</surname> <given-names>F. N.</given-names></name> <name><surname>Ram&#x000ED;rez</surname> <given-names>V. A.</given-names></name> <name><surname>Ruetti</surname> <given-names>E.</given-names></name></person-group> (<year>2022</year>). <article-title>Individual differences in emotional appraisal during development: analysis of the role of age, gender, and appraisal accuracy</article-title>. <source>J. Genet. Psychol.</source> <volume>183</volume>, <fpage>9</fpage>&#x02013;<lpage>22</lpage>. doi: <pub-id pub-id-type="doi">10.1080/00221325.2021.1997896</pub-id><pub-id pub-id-type="pmid">34766875</pub-id></mixed-citation>
</ref>
<ref id="B148">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Taddeo</surname> <given-names>M.</given-names></name> <name><surname>Floridi</surname> <given-names>L.</given-names></name></person-group> (<year>2018a</year>). <article-title>Regulate artificial intelligence to avert cyber arms race</article-title>. <source>Nature</source> <volume>556</volume>, <fpage>296</fpage>&#x02013;<lpage>298</lpage>. doi: <pub-id pub-id-type="doi">10.1038/d41586-018-04602-6</pub-id><pub-id pub-id-type="pmid">29662138</pub-id></mixed-citation>
</ref>
<ref id="B149">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Taddeo</surname> <given-names>M.</given-names></name> <name><surname>Floridi</surname> <given-names>L.</given-names></name></person-group> (<year>2018b</year>). <article-title>How AI can be a force for good</article-title>. <source>Science</source> <volume>361</volume>, <fpage>751</fpage>&#x02013;<lpage>752</lpage>. doi: <pub-id pub-id-type="doi">10.1126/science.aat5991</pub-id><pub-id pub-id-type="pmid">30139858</pub-id></mixed-citation>
</ref>
<ref id="B150">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Tanui</surname> <given-names>D. J.</given-names></name></person-group> (<year>2021</year>). <article-title>Application of Boyd&#x00027;s OODA loop to emergency response</article-title>. <source>J. Emerg. Manage.</source> <volume>19</volume>, <fpage>461</fpage>&#x02013;<lpage>468</lpage>. doi: <pub-id pub-id-type="doi">10.5055/jem.0564</pub-id><pub-id pub-id-type="pmid">34812481</pub-id></mixed-citation>
</ref>
<ref id="B151">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Thompson</surname> <given-names>M. M.</given-names></name> <name><surname>McCreary</surname> <given-names>D. R.</given-names></name></person-group> (<year>2006</year>). <article-title>&#x0201C;Enhancing mental readiness in military personnel,&#x0201D;</article-title> in <source>RTO Meeting Proceedings MP-HFM-134 on Human Dimensions in Military Operations &#x02013; Military Leaders&#x00027; Strategies for Addressing Stress and Psychological Support, 24&#x02013;26 April 2006, Brussels, Belgium</source> (<publisher-loc>Neuilly-sur-Seine</publisher-loc>: <publisher-name>RTO/NATO</publisher-name>), 4-1&#x02013;4-12. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.sto.nato.int/document/enhancing-mental-readiness-in-military-personnel/">https://www.sto.nato.int/document/enhancing-mental-readiness-in-military-personnel/</ext-link> (Accessed November 10, 2025).</mixed-citation>
</ref>
<ref id="B152">
<mixed-citation publication-type="web"><person-group person-group-type="author"><name><surname>Traberg</surname> <given-names>C. S.</given-names></name> <name><surname>Harjani</surname> <given-names>T.</given-names></name> <name><surname>Basol</surname> <given-names>M.</given-names></name> <name><surname>Biddlestone</surname> <given-names>M.</given-names></name> <name><surname>Maertens</surname> <given-names>R.</given-names></name> <name><surname>Roozenbeek</surname> <given-names>J.</given-names></name> <etal/></person-group>. (<year>2023</year>). <article-title>&#x0201C;Prebunking against misinformation in the modern digital age,&#x0201D;</article-title> in <source>Managing Infodemics in the 21st Century: Addressing New Public Health Challenges in the Information Ecosystem</source>, 99&#x02013;111. Available online at: <ext-link ext-link-type="uri" xlink:href="https://www.ncbi.nlm.nih.gov/books/NBK609022/">https://www.ncbi.nlm.nih.gov/books/NBK609022/</ext-link> (Accessed November 10, 2025). <pub-id pub-id-type="pmid">39556682</pub-id></mixed-citation>
</ref>
<ref id="B153">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Vallury</surname> <given-names>K. D.</given-names></name> <name><surname>Jones</surname> <given-names>M.</given-names></name> <name><surname>Oosterbroek</surname> <given-names>C.</given-names></name></person-group> (<year>2015</year>). <article-title>Computerized cognitive behavior therapy for anxiety and depression in rural areas: a systematic review</article-title>. <source>J. Med. Internet Res.</source> <volume>17</volume>:<fpage>e139</fpage>. doi: <pub-id pub-id-type="doi">10.2196/jmir.4145</pub-id><pub-id pub-id-type="pmid">26048193</pub-id></mixed-citation>
</ref>
<ref id="B154">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>van Diggelen</surname> <given-names>J.</given-names></name> <name><surname>Aidman</surname> <given-names>E.</given-names></name> <name><surname>Rowa</surname> <given-names>J.</given-names></name> <name><surname>Vince</surname> <given-names>J.</given-names></name></person-group> (<year>2025</year>). <article-title>Designing AI-enabled countermeasures to cognitive warfare</article-title>. <source>arXiv</source> [Preprint] arXiv:2504.11486.</mixed-citation>
</ref>
<ref id="B155">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Viviani</surname> <given-names>M.</given-names></name> <name><surname>Pasi</surname> <given-names>G.</given-names></name></person-group> (<year>2017</year>). <article-title>Credibility in social media: opinions, news, and health information&#x02014;a survey</article-title>. <source>Wiley Interdiscipl. Rev. Data Mining Knowl. Discov.</source> <volume>7</volume>:<fpage>e1209</fpage>. doi: <pub-id pub-id-type="doi">10.1002/widm.1209</pub-id></mixed-citation>
</ref>
<ref id="B156">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wallenius</surname> <given-names>C.</given-names></name> <name><surname>Nilsson</surname> <given-names>S.</given-names></name></person-group> (<year>2019</year>). <article-title>A lack of effect studies and of effects: the use of strategic communication in the military domain</article-title>. <source>Int. J. Strategic Commun.</source> <volume>13</volume>, <fpage>404</fpage>&#x02013;<lpage>417</lpage>. doi: <pub-id pub-id-type="doi">10.1080/1553118X.2019.1630413</pub-id></mixed-citation>
</ref>
<ref id="B157">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wang</surname> <given-names>G.</given-names></name> <name><surname>Frederick</surname> <given-names>R.</given-names></name> <name><surname>Duan</surname> <given-names>J.</given-names></name> <name><surname>Wong</surname> <given-names>W. B.</given-names></name> <name><surname>Rupar</surname> <given-names>V.</given-names></name> <name><surname>Li</surname> <given-names>W.</given-names></name> <etal/></person-group>. (<year>2025</year>). <article-title>Detecting misinformation through framing theory: the frame element-based model</article-title>. <source>J. Comput. Soc. Sci.</source> <volume>8</volume>:<fpage>72</fpage>. doi: <pub-id pub-id-type="doi">10.1007/s42001-025-00403-w</pub-id></mixed-citation>
</ref>
<ref id="B158">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name></person-group> (<year>2024a</year>). <article-title>The stress vaccine? How technology can increase resilience</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>27</volume>, <fpage>235</fpage>&#x02013;<lpage>237</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2024.92202.editorial</pub-id><pub-id pub-id-type="pmid">38652899</pub-id></mixed-citation>
</ref>
<ref id="B159">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name></person-group> (<year>2024b</year>). <article-title>Unmasking deception: strategies to combat AI-driven disinformation</article-title>. <source>Cyberpsychol. Behav. Soc. Netw.</source> <volume>27</volume>, <fpage>747</fpage>&#x02013;<lpage>749</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2024.0467</pub-id><pub-id pub-id-type="pmid">39311698</pub-id></mixed-citation>
</ref>
<ref id="B160">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name></person-group> (<year>2025a</year>). <article-title>The future of peacekeeping: navigating ethical AI deployment in conflict zones</article-title>. <source>Cyberpsychol. Behav. Soc. Netw</source> <volume>28</volume>, <fpage>451</fpage>&#x02013;<lpage>453</lpage>. doi: <pub-id pub-id-type="doi">10.1089/cyber.2024.0486</pub-id><pub-id pub-id-type="pmid">39429036</pub-id></mixed-citation>
</ref>
<ref id="B161">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name></person-group> (<year>2025b</year>). <article-title>Inoculation theory in the digital age: resilience against disinformation</article-title>. <source>Cyberpsychol. Behav. Soc. Netw</source>. <volume>28</volume>, <fpage>784</fpage>&#x02013;<lpage>786</lpage>. doi: <pub-id pub-id-type="doi">10.1177/21522715251399256</pub-id><pub-id pub-id-type="pmid">41273187</pub-id></mixed-citation>
</ref>
<ref id="B162">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name> <name><surname>Wiederhold</surname> <given-names>M. D.</given-names></name></person-group> (<year>2010</year>). <article-title>&#x0201C;Pre-deployment stress inoculation training,&#x0201D;</article-title> in <source>Stress Management and Peace Soldiering</source>, eds. <person-group person-group-type="editor"><name><surname>Ebner</surname> <given-names>G.</given-names></name> and <name><surname>Golth</surname> <given-names>D.</given-names></name></person-group> (<publisher-loc>Vienna</publisher-loc>: <publisher-name>National Defence Academy</publisher-name>), <fpage>55</fpage>&#x02013;<lpage>91</lpage>.</mixed-citation>
</ref>
<ref id="B163">
<mixed-citation publication-type="book"><person-group person-group-type="author"><name><surname>Wiederhold</surname> <given-names>B. K.</given-names></name> <name><surname>Wiederhold</surname> <given-names>M. D.</given-names></name></person-group> (<year>2024</year>). <article-title>&#x0201C;SIT and the future of peacekeeping missions. invited presentation/publication,&#x0201D;</article-title> in <source>Austrian Peacekeeper Forum 2024</source>, eds. <person-group person-group-type="editor"><name><surname>Ebner</surname> <given-names>G.</given-names></name> <name><surname>Egger</surname> <given-names>N.</given-names></name> and <name><surname>Schmidl</surname> <given-names>E.</given-names></name></person-group> (<publisher-loc>Vienna</publisher-loc>: <publisher-name>Vereinigung &#x000D6;sterreichischer Peacekeeper</publisher-name>), <fpage>70</fpage>&#x02013;<lpage>109</lpage>.</mixed-citation>
</ref>
<ref id="B164">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Wolfsfeld</surname> <given-names>G.</given-names></name></person-group> (<year>2004</year>). <source>Media and the Path to Peace</source>. Cambridge: Cambridge University Press. doi: <pub-id pub-id-type="doi">10.1017/CBO9780511489105</pub-id></mixed-citation>
</ref>
<ref id="B165">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yan</surname> <given-names>Z.</given-names></name> <name><surname>Tang</surname> <given-names>X.</given-names></name></person-group> (<year>2023</year>). <article-title>Narrative graph: telling evolving stories based on event-centric temporal knowledge graph</article-title>. <source>J. Syst. Sci. Syst. Eng.</source> <volume>32</volume>, <fpage>206</fpage>&#x02013;<lpage>221</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s11518-023-5561-0</pub-id><pub-id pub-id-type="pmid">37128597</pub-id></mixed-citation>
</ref>
<ref id="B166">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yang</surname> <given-names>K. C.</given-names></name> <name><surname>Ferrara</surname> <given-names>E.</given-names></name> <name><surname>Menczer</surname> <given-names>F.</given-names></name></person-group> (<year>2022</year>). <article-title>Botometer 101: social bot practicum for computational social scientists</article-title>. <source>J. Comput. Soc. Sci.</source> <volume>5</volume>, <fpage>1511</fpage>&#x02013;<lpage>1528</lpage>. doi: <pub-id pub-id-type="doi">10.1007/s42001-022-00177-5</pub-id><pub-id pub-id-type="pmid">36035522</pub-id></mixed-citation>
</ref>
<ref id="B167">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Yu</surname> <given-names>R.</given-names></name> <name><surname>Qiu</surname> <given-names>H.</given-names></name> <name><surname>Wen</surname> <given-names>Z.</given-names></name> <name><surname>Lin</surname> <given-names>C.</given-names></name> <name><surname>Liu</surname> <given-names>Y.</given-names></name></person-group> (<year>2016</year>). <article-title>A survey on social media anomaly detection</article-title>. <source>ACM SIGKDD Explor. Newslett.</source> <volume>18</volume>, <fpage>1</fpage>&#x02013;<lpage>14</lpage>. doi: <pub-id pub-id-type="doi">10.1145/2980765.2980767</pub-id></mixed-citation>
</ref>
<ref id="B168">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhang</surname> <given-names>J.</given-names></name> <name><surname>Zhang</surname> <given-names>R.</given-names></name> <name><surname>Zhang</surname> <given-names>Y.</given-names></name> <name><surname>Yan</surname> <given-names>G.</given-names></name></person-group> (<year>2018</year>). <article-title>The rise of social botnets: attacks and countermeasures</article-title>. <source>IEEE Trans. Depend. Secure Comput.</source> <volume>15</volume>, <fpage>1068</fpage>&#x02013;<lpage>1082</lpage>. doi: <pub-id pub-id-type="doi">10.1109/TDSC.2016.2641441</pub-id></mixed-citation>
</ref>
<ref id="B169">
<mixed-citation publication-type="journal"><person-group person-group-type="author"><name><surname>Zhao</surname> <given-names>X.</given-names></name> <name><surname>Deng</surname> <given-names>Y.</given-names></name> <name><surname>Yang</surname> <given-names>M.</given-names></name> <name><surname>Wang</surname> <given-names>L.</given-names></name> <name><surname>Zhang</surname> <given-names>R.</given-names></name> <name><surname>Cheng</surname> <given-names>H.</given-names></name> <etal/></person-group>. (<year>2024</year>). <article-title>A comprehensive survey on relation extraction: recent advances and new frontiers</article-title>. <source>ACM Comput. Surv.</source> <volume>56</volume>, <fpage>1</fpage>&#x02013;<lpage>39</lpage>. doi: <pub-id pub-id-type="doi">10.1145/3674501</pub-id></mixed-citation>
</ref>
</ref-list>
<fn-group>
<fn fn-type="custom" custom-type="edited-by" id="fn0001">
<p>Edited by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/431526/overview">Martina Amanzio</ext-link>, University of Turin, Italy</p>
</fn>
<fn fn-type="custom" custom-type="reviewed-by" id="fn0002">
<p>Reviewed by: <ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/1399628/overview">Vaitsa Giannouli</ext-link>, Democritus University of Thrace, Greece</p>
<p><ext-link ext-link-type="uri" xlink:href="https://loop.frontiersin.org/people/3314713/overview">Carolina Escudero</ext-link>, University of Missouri, United States</p>
</fn>
</fn-group>
</back>
</article> 
