攻撃に対して「ハックされにくい人間」に

Day 122  習慣ループ : なぜ測定が重要なのか A Practical Measurement System for Security Habits (3 layers)

»

[シリーズ構造] 柱E|癖にする

習慣とは、意志の強さではない。プレッシャー下でも"考えずに"正しい行動が出る自動性である。人は緊張すると熟考しない。だからこそ、判断は設計する必要がある。そして自動性は、感覚ではなく観察でしか分からない。測定は管理のためではない。 正しい行動が、無意識に出る確率を高めるためにある。測れない習慣は、育たない。

▶ シリーズ概要: シリーズ全体マップ:人間のしなやかさ ― サイバー判断力のために

▶ 柱E|習慣と自律 関連記事:

習慣ループ: なぜ測定が重要なのか

u5292553157_can_you_make_an_illustration_the_journey_ending_-_40e4e574-11c8-4e99-bba2-0f517f7af121_2.png

習慣とは、「正しいことをすること」ではありません。習慣とは、きっかけが現れた瞬間に、ほぼ自動的に正しい行動が出ること。

本質は、意志の強さではなく。本質は、自動性です。

どれだけ強く決意しているかではなく、どれだけ"考えずに"その行動が出るか。

習慣研究においても、「習慣の強さ」は意識の高さではなく、自動性の度合いとして捉えられます。つまり、どれだけ少ない認知負荷で行動が実行されるか。

ここが核心です。

プレッシャーがかかった瞬間、人は熟考しません。焦り、責任、時間制限。その環境では、思考は縮みます。

だからこそ必要なのは、考えなくても出る行動の設計。

セキュリティ判断も同じです。
緊張下で「ちゃんと考えよう」は、もう遅い。

その前に、"出る動き"を決めておく。

ここで測定が意味を持ちます。

自動性は、主観ではわかりません。

「できている気がする」は、あてにならない。

本当に習慣になっているかどうかは、
・反応時間
・迷いの有無
・繰り返しの安定性


といった観察可能なパターンとしてしか見えない。

自動性は、"感じるもの"ではない。

観察して、はじめてわかるもの。

だから、測る。

測るのは管理のためではない。
評価のためでもない。

自動性が育っているかを、確かめるため。

習慣を育てるとは、意志を強くすることではない。

正しい行動が、ほぼ無意識に出る確率を上げること。

そして、その確率は、測らなければ、上げられない。

---

[Series Structure] Pillar E | The Science of Making Good Judgment a Habit

Habits are not about willpower. They are about automaticity, the ability to act correctly without thinking, especially under pressure. When stress rises, deliberation shrinks. That's why judgment must be designed in advance. Automaticity cannot be felt, it must be observed. Measurement isn't about control or evaluation. It's about verifying that the right behavior emerges reliably and effortlessly. If we don't measure it, you can't grow it.

▶ Series overview: Series Map -- Human Flexibility for Cyber Judgment

▶ Other posts in Pillar E (Habit & Autonomy):

A Practical Measurement System for Security Habits (3 layers)

u5292553157_can_you_make_an_illustration_the_journey_ending_-_40e4e574-11c8-4e99-bba2-0f517f7af121_2.png

Layer 1 -- Leading Indicators of Habit Development (early signal) --NIST

Leading indicators tell you whether the habit is forming, before you wait for breaches or major incidents. NIST explicitly discusses measurement as supporting data-driven decisions and notes phishing tests as an example of experimentation used to collect security data.

Use these as your "early warning dashboard":

Metric

Operational definition (make it measurable)

Why it matters

Time-to-report suspicious items

Median minutes from receipt/encounter → report submitted

Shortens attacker opportunity window; shows reflex strength

Verification rate

% of high-risk actions preceded by required verification step(s)

Measures "pause-and-check" behavior

Password manager adoption (active)

% of users with weekly active use (not just installed)

Distinguishes real habit from checkbox adoption

MFA coverage (consistent use)

% of critical accounts enrolled and used successfully

Coverage + reliability

Update latency

Median time from update availability → install

A measurable hygiene habit (also a risk reducer)

If you need a concrete definition for "phishing dwell time," one workable industry definition is the average time users take to recognize and respond to a phishing attempt.

And for remediation speed, MTTR is commonly defined as the average time to detect and fully fix a vulnerability/security issue, including steps like verification and prioritization.

Layer 2 -- Behavioral Consistency Metrics (is it stable?)

A habit is not proven when it appears once. It's proven when it appears reliably across contexts, especially when attention is fragmented.

Track:

  1. Habit execution rate
    Definition:
    Habit execution rate = (successful habit executions) / (relevant opportunities)
    This forces you to count opportunities, not just outcomes.
  2. Automaticity development
    Habit research often models habit strength (automaticity) rising over time and then plateauing; one widely cited pattern is an asymptotic rise with an average plateau around ~66 days, with variation by behavior complexity.
  3. Stress resilience
    Measure the same habit execution rate under:
  • end-of-day fatigue
  • deadline pressure
  • context switching (meetings + chat + email)
    If it collapses under load, it's still a "nice intention," not a habit

Integration success
Qualitative-but-trackable check: "Does this behavior fit the workflow without heroics?"
(Example: reporting is one click; verification is built into the tool; updates are scheduled.)

References 出典・参照文献

Chaudhary, S., & Gkioulos, V. (2022). Metrics for the evaluation of a cybersecurity awareness program. Journal of Cybersecurity, 8(1), tyac006. https://doi.org/10.1093/cybsec/tyac006

Engeler, N., & Gilbert, S. J. (2020). The effect of metacognitive training on confidence and strategic reminder setting. PLOS ONE, 15(10), e0240755. https://doi.org/10.1371/journal.pone.0240755

Gardner, B., Lally, P., & Wardle, J. (2012). Making health habitual. British Journal of General Practice, 62(605), 664-666. https://doi.org/10.3399/bjgp12X659466

Gertner, A., Zaromb, F., Schneider, R., Roberts, R. D., & Matthews, G. (2016). The assessment of biases in cognition: Development and evaluation of an assessment instrument for the measurement of cognitive bias (MITRE Technical Report MTR160163). The MITRE Corporation. https://www.mitre.org/sites/default/files/publications/pr-16-0956-the-assessment-of-biases-in-cognition.pdf

Jacobs, J., Haney, J., & Furman, S. M. (2022, August). Measuring the effectiveness of U.S. government security awareness programs: A mixed-methods study (Short paper). In Eighteenth Symposium on Usable Privacy and Security (SOUPS 2022), 8th Workshop on Security Information Workers (WSIW 2022), Boston, MA, United States. National Institute of Standards and Technology. https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=934952

Keepnet Labs. (2025, February 14). What is phishing dwell time and quickest response time for security awareness training? https://keepnetlabs.com/blog/what-is-phishing-dwell-time-and-quickest-response-time-for-security-awareness-training

MoniqqueK. (2024, October 14). The Habit Loop Model [Image]. Wikimedia Commons. https://commons.wikimedia.org/wiki/File:The_Habit_Loop_Model.png

Schroeder, K., Trinh, H., & Pillitteri, V. Y. (2024). Measurement guide for information security: Volume 1--Identifying and selecting measures (NIST Special Publication 800-55v1). National Institute of Standards and Technology. https://doi.org/10.6028/NIST.SP.800-55v1

Tenable. (2026, January 27). What is MTTR and how to improve it? https://www.tenable.com/cybersecurity-guide/learn/mean-time-to-remediate-mttr

University College London. (2009, August). How long does it take to form a habit? https://www.ucl.ac.uk/news/2009/aug/how-long-does-it-take-form-habit

Comment(0)

コメント

コメントを投稿する