Browse Definitions :
Definition

brain hacking

Brain hacking is the application of techniques and/or technologies to affect an individual’s mental state, cognitive processes or level of function. Such efforts may be intentionally applied by the individual as a tool for personal development or by an employer as a part of employee wellness and productivity initiatives.

As an approach for personal development, brain hacking seeks to enhance cognitive function and optimize efficacy and happiness. Brain-centered approaches to this end include meditation, metacognitive therapy, attention training and memory training. Continuing to learn and challenge the brain is essential; things like learning a new language or studying a new discipline improve the brain’s ability to function. Recent research indicates that, for greatest effect, learning experiences must be somewhat difficult and require effort. A more holistic approach to brain hacking includes all the recommendations for health and wellbeing, such as a nutritious and varied diet, adequate exercise, involvement in a community and time spent outdoors in nature.

Brain hacking is also used by external parties such as marketers and product designers to influence individual behavior. Social engineering, which exploits individual vulnerabilities to conduct security breaches, can also be considered a type of brain hacking. When the intention is to manipulate the target’s behavior without their knowledge or consent, brain hacking is sometimes referred to as brain hijacking.

Marketers and product designers adopt principles from neuroscience, behavioral psychology and sociology to develop compulsive elements for user interfaces, software Mobile apps, social media, games and marketing content.

This was last updated in December 2018

Continue Reading About brain hacking

SearchNetworking
  • virtual network functions (VNFs)

    Virtual network functions (VNFs) are virtualized tasks formerly carried out by proprietary, dedicated hardware.

  • network functions virtualization (NFV)

    Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have ...

  • overlay network

    An overlay network is a virtual or logical network that is created on top of an existing physical network.

SearchSecurity
  • encryption

    Encryption is the method by which information is converted into secret code that hides the information's true meaning.

  • X.509 certificate

    An X.509 certificate is a digital certificate that uses the widely accepted international X.509 public key infrastructure (PKI) ...

  • directory traversal

    Directory traversal is a type of HTTP exploit in which a hacker uses the software on a web server to access data in a directory ...

SearchCIO
  • security audit

    A security audit is a systematic evaluation of the security of a company's information system by measuring how well it conforms ...

  • chief transformation officer (CTO)

    Chief transformation officer is an executive role, often in the C-suite, that focuses on bringing about change as well as growth ...

  • data latency

    Data latency is the time it takes for data packets to be stored or retrieved. In business intelligence (BI), data latency is how ...

SearchHRSoftware
SearchCustomerExperience
  • implementation

    Implementation is the execution or practice of a plan, a method or any design, idea, model, specification, standard or policy for...

  • first call resolution (FCR)

    First call resolution (FCR) is when customer service agents properly address a customer's needs the first time they call.

  • customer intelligence (CI)

    Customer intelligence (CI) is the process of collecting and analyzing detailed customer data from internal and external sources ...

Close