Training Humans to Face AI Risks
Think First
Engage independent human reasoning before relying on AI assistance or automated systems
Verify Always
Cross-check critical AI-generated information through independent sources before taking action
TFVA Protocol Improves Human Self-Protection Against AI-Risks

Get the Research Paper
Read the peer-reviewed study published on arXiv demonstrating the effectiveness of the TFVA protocol
Download The Full Paper (PDF) View on arXiv
Built on AIJET Principles
Five operational principles that translate ethical AI into measurable cognitive safeguards
“We Detect, Verify, Decide, Act Ethically, and Show Our Work”
Scientific Evidence
A randomized controlled trial (n=151) demonstrated statistically significant improvements in cognitive security performance following a minimal 3-minute intervention.
View Full Methodology & ResultsAbout TFVA Protocol
The “Think First, Verify Always” protocol (or TFVA protocol) was developed as part of the Human CyberSecurity Knowledge (HCSK) initiative. As AI-enabled threats increasingly exploit cognitive vulnerabilities rather than technical ones, traditional device-centric security measures prove insufficient.
TFVA addresses this gap by operationalizing five ethical principles (AIJET) into concrete cognitive security practices. Unlike abstract AI ethics frameworks, TFVA provides actionable protocols that can be rapidly deployed and immediately measured.
The protocol has been empirically validated and is offered freely to organizations, educators, and individuals worldwide under Creative Commons Attribution 4.0 License.
Featured By
Human-Technology Collaboration Research Lab @ George Washington University: https://htc.weshareresearch.com/2025/08/07/think-first-verify-always-training-humans-to-face-ai-risks/
ADS – Harvard University: https://ui.adsabs.harvard.edu/abs/2025arXiv250803714A/abstract
Arxiv: https://arxiv.org/abs/2508.03714
ReasearchGate: https://www.researchgate.net/publication/394362164_Think_First_Verify_Always_Training_Humans_to_Face_AI_Risks
DevDiscourse: https://www.devdiscourse.com/article/technology/3532758-new-protocol-trains-humans-as-firewalls-against-ai-manipulation
Cogent InfoTech: https://www.cogentinfo.com/resources/the-human-firewall-building-a-cyber-aware-workforce
Safe Harbour Security: https://safeharboursecurity.com/blog/smes-ai-risks-cybersecurity-training/