First psychoanalytic-cognitive model for pre-cognitive security vulnerabilities
"Technical defenses fail where psychology prevails" - 85% breaches involve human factors
- 100 indicators across 10 vulnerability categories
 - Ternary scoring: Green/Yellow/Red risk assessment
 - Attack vector mapping to known exploit patterns
 - Privacy-preserving aggregate analysis
 
Join our Discord server for discussions, collaboration, and pilot studies: CPF3 Community https://discord.gg/xNRkTPeQ
# Verify document integrity:
openssl sha256 CPF_Preprint.pdf
# Compare with: dfb55fc21e1b204c342aa76145f1329fa6f095ceddc3aad8486dca91a580fa96- 
Bitcoin block 909232 attests existence as of 2025-08-09 CET
 
CPF (Public)/
│
├── auditor-field-kit/
│   └── [Auditor assessment tools and checklist]
│
├── languages/
│   └── [Multilingual resources and translations]
│
│── presentations/               # Main presentations folder
│   ├── authority-vulnerabilities/      # Category 1.x
│       └─── 1.2-diffusion-responsibility/  # Specific indicator
│            └─── slides.pdf
│
├── research/
│   └── [Foundational research materials]
│
├── vulnerabilities/
│   └── [Vulnerability taxonomy and documentation]
│
├── The_Cybersecurity_Psychology_Framework/
│   ├── (Taxonomy Complete).tex
│   ├── [Additional framework documents]
│   └── [Supporting materials]
│
├── cpf-maturity-model.md
├── cpf-white-paper.md
├── logo.svg
└── README.md| Category | Key Concept | Example Vulnerability | 
|---|---|---|
| Authority-Based (1.x) | Milgram obedience | CEO fraud susceptibility | 
| Temporal (2.x) | System 1 heuristic | Urgency-induced security bypass | 
| Social Influence (3.x) | Cialdini's principles | Reciprocity exploitation | 
| Affective (4.x) | Klein-Bowlby affect theory | Fear-based decision paralysis | 
| Cognitive Overload (5.x) | Miller's cognitive limits | Alert fatigue desensitization | 
| Group Dynamic (6.x) | Bion's basic assumptions | Groupthink security blind spots | 
| Stress Response (7.x) | Selye's stress theory | Acute stress impairment | 
| Unconscious Process (8.x) | Jungian shadow | Shadow projection onto attackers | 
| AI-Specific (9.x) | Anthropomorphism | Over-trust in AI systems | 
| Critical Convergent States (10.x) | System theory | Perfect storm conditions | 
- Psychoanalytic Foundations: Bion's Basic Assumptions, Kleinian Splitting
 - Cognitive Vulnerabilities: System 1/System 2 risks, Cialdini's principles
 - AI-Specific: Anthropomorphism, automation bias
 
flowchart TD
    A[Pre-Cognitive Vulnerabilities] --> B[Psychoanalytic]
    A --> C[Cognitive]
    B --> D[Bion's Basic Assumptions]
    B --> E[Kleinian Splitting]
    C --> F[System 1 Heuristics]
    C --> G[System 2 Limitations]
    @misc{canale2025cpf,
  title        = {Cybersecurity Psychology Framework},
  author       = {Canale, Giuseppe},
  year         = {2025}, 
  doi          = {10.5281/zenodo.16795774},
  url          = {https://github.com/xbaey/CPF},
  note         = {Preprint version 1.0}
}- Author: Giuseppe Canale, CISSP
 - Website: cpf3.org
 - Email: [email protected]
 - Academic Profile: ORCID 0009-0007-3263-6897
 - Professional Profile: LinkedIn
 - Repository Maintainer: @xbeat