{"id":109041,"date":"2020-04-09T06:00:47","date_gmt":"2020-04-09T13:00:47","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=109041"},"modified":"2020-04-21T14:14:39","modified_gmt":"2020-04-21T21:14:39","slug":"cyber-canon-design-for-how-people-think","status":"publish","type":"post","link":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/2020\/04\/cyber-canon-design-for-how-people-think\/","title":{"rendered":"Book Review: \"Design for How People Think\""},"content":{"rendered":"<p><b>Cybersecurity Canon Candidate Book Review: \u201c<\/b><span style=\"font-weight: 400;\">Design for How People Think,\u201d<\/span> <span style=\"font-weight: 400;\">by John Whalen (Published April 23, 2018)<\/span><\/p>\n<p><b>Book Reviewed by:<\/b><span style=\"font-weight: 400;\"> William Yurek, president, Inspired Hacking Solutions LLC<\/span><\/p>\n<p><b>Bottom Line: <\/b><i><span style=\"font-weight: 400;\">I don't recommend this book for the Cybersecurity Canon Hall of Fame, but if you are interested in the topic, this is a good one to read.<\/span><\/i><\/p>\n<p><b>Review:<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u201cDesign for How People Think\u201d isn\u2019t a cybersecurity book, per se. It is a book geared toward helping readers understand how people view and digest information. I read it because I have been looking for better ways to improve the consumption of cyber risk data my team publishes. Anyone can put information on a web page or in a document, but how many stop to think how they should structure that reporting so a consumer receives what he or she expects?\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The author, John Whalen, has a Ph.D. in cognitive science and more than 15 years of human-centered design experience. In this book, he educates the reader about what I call \u201cthinking science,\u201d meaning how the brain works and how understanding the way your customers or consumers think can help you build better products and services. Whalen organizes human perception into what he calls \u201cthe Six Minds.\" The Six Minds can best be described as the six ways people try to locate, organize, consume and respond to information that is presented to them. He takes what could be a very dry and frankly incomprehensible topic and makes it into an easy-to-read, informative book.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As I read it, I saw how many of the human behaviors he observes are ones I myself practice. Interestingly, and to some extent troubling, Whalen notes that our almost-constant interaction with well-known e-commerce sites has conditioned us like Pavlov\u2019s dog: Without conscious thought, we look for certain types of information to be in certain places and accessed in certain ways. Information that doesn\u2019t fit this model makes us confused and makes our interaction with it unpleasant and unproductive.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The book is definitely geared more toward those who work in e-commerce or adjacent industries, such as a retail sales site, but the information Whalen provides can definitely be used in other areas as well. I came away with several takeaways for my team to use moving forward as we seek to optimize consumer usage of our reporting.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This book is very helpful to those just starting to look at \u201cthinking science.\u201d \u201cDesign for How People Think\u201d is a good book, but I don\u2019t see it as indispensable for the cybersecurity practitioner.<\/span><\/p>\n<p><i>We modeled the\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/\"><i>Cybersecurity Canon<\/i><\/a><i>\u00a0after the Baseball or Rock &amp; Roll Hall-of-Fame, except for cybersecurity books. We have more than 25 books on the initial candidate list, but we are soliciting help from the cybersecurity community to increase the number to be much more than that.\u00a0Please write a review and nominate your favorite.\u00a0<\/i><\/p>\n<p><i>The Cybersecurity Canon is a real thing for our community. We have designed it so that you can\u00a0<\/i><a href=\"https:\/\/cybercanon.paloaltonetworks.com\/nominate-a-book\/\"><i>directly participate in the process<\/i><\/a><i>. Please do so!<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u201cDesign for How People Think\u201d isn\u2019t a cybersecurity book, but it is useful for considering how best to report cyber risk data so it\u2019s accessible.<\/p>\n","protected":false},"author":394,"featured_media":109043,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[4521,6724],"tags":[7058,4270],"coauthors":[4252],"class_list":["post-109041","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-canon","category-points-of-view","tag-cyber","tag-cybersecurity-canon-review"],"jetpack_featured_media_url":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-content\/uploads\/2020\/04\/CANON-LOGO_350x300.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109041","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/394"}],"replies":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=109041"}],"version-history":[{"count":2,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109041\/revisions"}],"predecessor-version":[{"id":109213,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/109041\/revisions\/109213"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/109043"}],"wp:attachment":[{"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=109041"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=109041"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=109041"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/origin-researchcenter.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=109041"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}