Cognitive Science Can Explain Why Fake News Works

Although the term itself is not new, fake news presents a growing threat for Internet societies across the world. Only a small amount of fake news is needed to disrupt a conversation, and at extremes it can have an impact on democratic processes, including elections. 
 
But what can we do to avoid fake news, at a time when we could be waiting a while for mainstream media and social networks to step up and address the problem? 
 
From a psychology perspective, an important step in tackling fake news is to understand why it gets into our mind. We can do this by examining how memory works and how memories become distorted. Using this viewpoint generates some tips you can use to work out whether you’re reading or sharing fake news.
 
How memory gets distorted at the source
Fake news often relies on misattribution, instances in which we can retrieve things from memory but can’t remember their source. Misattribution is one of the reasons advertising is so effective. We see a product and feel a pleasant sense of familiarity because we’ve encountered it before, but fail to remember that the source of the memory was an ad. 
 
One study examined headlines from fake news published during the 2016 US presidential election. The researchers found even a single presentation of a headline (such as “Donald Trump Sent His Own Plane to Transport 200 Stranded Marines,” based on claims shown to be false) was enough to increase belief in its content. 
 
This effect persisted for at least a week, and it was still found when headlines were accompanied by a fact-check warning or even when participants suspected it might be false. Repeated exposure can increase the sense that misinformation is true. Repetition creates the perception of group consensus that can result in collective misremembering, a phenomenon called the Mandela Effect. 
 
It might be harmless when people collectively misremember something fun, such as a childhood cartoon (did the Queen in Disney’s Snow White really not say “Mirror, mirror”?). But it has serious consequences when a false sense of group consensus contributes to rising outbreaks of measles.
 
Scientists have investigated whether targeted misinformation can promote healthy behavior. Dubbed false-memory diets, it is said that false memories of food experiences can encourage people to avoid fatty foods, alcohol, and even convince them to love asparagus.
 
Creative people that have a strong ability to associate different words are especially susceptible to false memories. Some people might be more vulnerable than others to believe fake news, but everyone is at risk.
 
How bias can reinforce fake news
Bias is how our feelings and worldview affect the encoding and retrieval of memory. We might like to think of our memory as an archivist that carefully preserves events, but sometimes it’s more like a storyteller. Memories are shaped by our beliefs and can function to maintain a consistent narrative rather than an accurate record.
 
An example of this is selective exposure, our tendency to seek information that reinforces our pre-existing beliefs and to avoid information that brings those beliefs into question. This effect is supported by evidence that television news audiences are disproportionately partisan and can exist in their own echo chambers. It was thought that online communities exhibit the same behavior, contributing to the spread of fake news, but this appears to be a myth. Political news sites are often populated by people with diverse ideological backgrounds and echo chambers are more likely to exist in real life than online. 
 
Our brains are wired to assume things we believe originated from a credible source. But are we more inclined to remember information that reinforces our beliefs? This is probably not the case. People who hold strong beliefs remember things that are relevant to their beliefs, but they remember opposing information too. This happens because people are motivated to defend
their beliefs against opposing views. 
 
Belief echoes are a related phenomenon that highlight the difficulty of correcting misinformation. Fake news is often designed to be attention-grabbing. It can continue to shape people’s attitudes after it has been discredited because it produces a vivid emotional reaction and builds on our existing narratives. Corrections have a much smaller emotional impact, especially if they require policy details, so should be designed to satisfy a similar narrative urge to be effective.
 
Tips for resisting fake news
The way our memory works means it might be impossible to resist fake news completely. But one approach is to start thinking like a scientist. This involves adopting a questioning attitude that is motivated by curiosity and being aware of personal bias.
For fake news, this might involve asking ourselves the following questions:
  • What type of content is this? Many people rely on social media and aggregators as their main source of news. By reflecting on whether information is news, opinion, or even humor, this can help consolidate information more completely into memory.
  • Where is it published? Paying attention to where information is published is crucial for encoding the source of information into memory. If something is a big deal, a wide variety of sources will discuss it, so attending to this detail is important.
  • Who benefits? Reflecting on who benefits from you believing the content helps consolidate the source of that information into memory. It can also help us reflect on our own interests and whether our personal biases are at play.
Some people tend to be more susceptible to fake news because they are more accepting of weak claims. But we can strive to be more reflective in our open-mindedness by paying attention to the source of information, and questioning our own knowledge if and when we are unable to remember the context of our memories.
 
Nieman Lab
 
You Might Also Read:

Websites To Be Fined Over 'online harms' Under New UK Law:

Cyberwar: Enter the Trolls:

 

« Ethical Hacker Guilty Of Malware Attacks
N. Korea’s 4Cs: Crypto-Currency-Cyber-Crime »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Synopsys

Synopsys

Synopsys delivers trusted and comprehensive silicon to systems design solutions, from electronic design automation to silicon IP and system verification and validation.

aeCERT

aeCERT

aeCERT is the national Computer Emergency Response Team for the United Arab Emirates.

HudsonCyber

HudsonCyber

HudsonCyber, part of HudsonAnalytix, provides leading cyber risk management services for the global maritime transportation industry.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Ogasec

Ogasec

Ogasec is a cybersecurity company formed by the merger between Aker and N-Stalker in 2017. Solutions include Security & Connectivity Networking, Application Security, and Managed Security Services.

LightEdge Solutions

LightEdge Solutions

LightEdge’s highly-trained compliance and security experts take the guesswork out of keeping your business protected.

GreyCortex

GreyCortex

GreyCortex uses advanced artificial intelligence, machine learning, and data mining methods to help organizations make their IT operations secure and reliable.

Axcient

Axcient

Axcient offers MSPs the most secure backup and disaster recovery technology stack with a proven Business Availability suite.

Charterhouse Müller UK

Charterhouse Müller UK

Charterhouse Müller UK are a leading service provider for end of life IT services including data erasure and secure IT asset disposal.

Garner Products

Garner Products

Garner design, manufacture, and sell equipment that delivers complete, permanent, and verifiable data elimination.

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

Cybersecurity Center for Secure Evolvable Energy Delivery Systems (SEEDS)

SEEDS conducts research and develops innovative cybersecurity technologies, tools, and methodologies that advance the energy sector’s ability to survive cyber incidents.

ArmorCode

ArmorCode

ArmorCode's intelligent application security platform gives us unified visibility into AppSec postures and automates complex DevSecOps workflows.

RB42

RB42

RB42 (formerly Nexa Technologies) provide cyber defense solutions (ComUnity, secure and encrypted messaging, detection of interception tools, etc) and cyber defense consultancy service.

Allure Security

Allure Security

Allure Security AI-driven brand protection scans more of the online world for faster, more accurate detection & removal of spoof websites, social media & mobile apps -- before customers fall victim.

TRM Labs

TRM Labs

TRM enables risk management and compliance for a global community of financial institutions, cryptocurrency businesses and government agencies.

Reco AI

Reco AI

Reco is an identity-centric SaaS security solution that empowers organizations with full visibility into every app, identity, and their actions to control risk in their SaaS ecosystem.