🗺️

The Dimensional Map

Topology → Dimensional Analysis

Six dimensions of cognitive sovereignty. What they are, how they relate, how each degrades under capture. The full topology of the human mind under pressure.

The Question This Framework Answers

What are the dimensions of cognitive sovereignty?

Dimensional Topology

Hover any dimension · click to see cascade paths

Six Dimensions of Cognitive Sovereignty and Cascade Paths
DimensionDomainCascades To
I. AttentionalFocusReasoning, Emotional, Perceptual
II. PerceptualSourcesSocial Cognitive, Epistemic
III. ReasoningLogicEmotional, Social Cognitive
IV. EmotionalRegulationPerceptual, Social Cognitive
V. Social CognitiveSocial navigationEpistemic
VI. EpistemicBelief formation
Each dimension is distinct · each amplifies or constrains the others · capture in one cascades

The Six Dimensions

Each dimension answers a different question about your cognitive sovereignty. Together, they form a complete map.

I
Attentional Sovereignty

Can you voluntarily direct and sustain attention on self-chosen tasks against competing stimuli? Can you disengage from captive attentional environments at will?

Capture Mechanisms

  • Variable-ratio notification scheduling
  • Infinite scroll / bottomless feeds
  • Algorithmic elimination of session endpoints
  • Attentional fragmentation through multi-source engagement

Restoration Pathways

  • Nature exposure
  • Mindfulness practice
  • Digital environment restructuring
  • Notification architecture reform

Degradation Pathway

Variable-ratio trains attention to expect interruption → infinite scroll eliminates cessation practice → notification architecture ensures even protected focus is interrupted → directed attention capacity atrophies over time.

Reversibility: High. Among most reversible dimensions. Attention restoration and mindfulness document recovery through reduced-stimulation environments.

II
Perceptual Sovereignty

Can you evaluate information sources for credibility — assessing reliability without defaulting to credulity or wholesale distrust? Can you maintain calibrated skepticism?

Capture Mechanisms

  • Algorithmic filtering for engagement over accuracy
  • Fake news amplification (false info spreads faster)
  • Social proof cascades via like/share counts
  • Invisible filtering — no baseline for comparison

Restoration Pathways

  • Lateral reading practice
  • Slow news practices
  • Deliberate source diversity
  • Media literacy training

Degradation Pathway

Algorithmic filtering creates invisible distortion → user has no baseline for undistorted environment → engagement-ranked content overrepresents the sensational → source evaluation never practiced → perceptual calibration drifts without awareness.

Reversibility: High once filtering identified. Primary barrier is motivation: distorted perception often feels comfortable.

III
Reasoning Sovereignty

Can you reason from evidence to conclusions without systematic distortion by cognitive biases, emotional state contamination, or speed pressure?

Capture Mechanisms

  • Sleep displacement and disruption
  • Cognitive overload engineering
  • Emotional priming prior to claims
  • Speed environments forcing heuristic processing

Restoration Pathways

  • Sleep hygiene
  • Slow deliberate reading
  • Structured argumentation practice
  • Digital environment simplification

Degradation Pathway

Sleep disruption degrades executive function → information overload exhausts working memory → emotional priming reduces analytic capacity → reasoning defaults to heuristics → depleted reasoner may encounter accurate information and still fail to reason correctly about it.

Reversibility: Mixed. Acute degradation highly reversible through sleep restoration and load reduction. Chronic degradation carries structural prefrontal costs.

IV
Emotional Sovereignty

Can you regulate emotional states without external prosthesis — specifically, without using digital platform engagement as your primary emotional regulation mechanism?

Capture Mechanisms

  • Continuous social comparison infrastructure
  • Outrage / moral emotion amplification
  • Validation architecture via quantified metrics
  • Variable-ratio reinforcement conditioning

Restoration Pathways

  • DBT-based emotion regulation training
  • Social comparison reduction
  • Distress tolerance practice
  • Platform use pattern restructuring

Degradation Pathway

Social comparison creates chronic affect dysregulation → outrage amplification elevates baseline arousal → validation architecture externalizes self-evaluation → baseline regulation capacity atrophies → platform becomes primary emotional regulation tool.

Reversibility: Moderate. Recoverable but time-required. Withdrawal effects create significant barrier to voluntary disengagement.

V
Social Cognitive Sovereignty

Can you navigate social information environments without distortion by algorithmically amplified social comparison, status anxiety, or tribalistic in-group/out-group cognition?

Capture Mechanisms

  • Engagement-optimized comment systems amplifying conflict
  • Parasocial relationship substitution
  • Anonymity / deindividuation architecture
  • Out-group caricature via filter bubbles

Restoration Pathways

  • In-person reciprocal social engagement
  • Deliberate out-group perspective exposure
  • Engagement metric removal
  • Mindfulness of social comparison triggers

Degradation Pathway

Engagement-ranked comments distort models of what others believe → parasocial relationships substitute for reciprocal ones, atrophying mentalizing capacity → anonymity reduces empathic consideration → distorted inputs + reduced practice = compounding degradation.

Reversibility: Moderate. Capacities restored through use. Primary barrier: if capture has substituted for reciprocal environments, restoration requires rebuilding social contexts.

VI
Epistemic Sovereignty

Can you form, revise, and hold beliefs through your own epistemic processes rather than through deference to algorithmically curated consensus signals, social proof manipulation, or identity-motivated belief adoption?

Capture Mechanisms

  • Personalized information enclosures (filter bubbles)
  • Algorithmic authority misattribution
  • Information volume as overwhelm
  • Social proof substitution for evidence

Restoration Pathways

  • Intellectual humility practice
  • Deliberate engagement with dissenting evidence
  • Actively open-minded thinking exercises
  • Information source diversification

Degradation Pathway

Filter bubbles reduce exposure to diverse evidence → algorithmic curation mimics trusted expert selection → information volume forces proxy reliance → independent evaluation capacity atrophies while consensus-tracking strengthens → degraded state feels like competence.

Reversibility: Difficult. Among hardest to reverse because the degraded state feels like being well-informed. Recovery requires reduced exposure AND active practice in independent evaluation.

The Compound Effect

The most severe capture profiles are not the sum of independent impairments but emergent configurations where each dimension amplifies the others. Restoring attentional sovereignty first may be more efficient than addressing all six simultaneously — because attentional restoration enables the reasoning capacity required for the other restorations.

Dimensional Interactions

How degradation in one dimension cascades into others.

Primary Degradation Amplifies Mechanism
Attentional Reasoning Fragmented attention prevents sustained evidence evaluation; System 2 requires sustained attention
Reasoning Epistemic Depleted reasoning forces social proxy reliance — proxy reliance is core epistemic degradation
Emotional Reasoning Affect dysregulation reduces analytic processing capacity
Social Cognitive Epistemic Distorted models of others distort whose testimony to credit in belief formation
Perceptual Social Cognitive Distorted social reality representations distort models of what groups believe and why
Attentional Emotional Inability to disengage from feed prevents emotional processing cycle completion

Connections to Other Frameworks