Buch, Englisch, 176 Seiten, Format (B × H): 156 mm x 234 mm
What Firewalls, Failures, and the Frontlines Taught Me About Trust
Buch, Englisch, 176 Seiten, Format (B × H): 156 mm x 234 mm
Reihe: Security, Audit and Leadership Series
ISBN: 978-1-041-17267-3
Verlag: Taylor & Francis Ltd
Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical infrastructure. Drawing on her military and cybersecurity background, Nia presents the Trust Protocol, a strategic, actionable framework modelled on cybersecurity principles. The book argues that trust, like a firewall, must be systematically designed, monitored, and maintained.
Through compelling stories and practical tools, Luckey explores three core pillars: Authentication (proving credibility through consistency), Encryption (creating psychological safety), and Resilience (planning for inevitable trust breaches). She provides leaders with diagnostics, playbooks, and rituals to embed trust into daily operations, teams, and organizational culture. The final chapters address leading through AI and automation, emphasizing ethical oversight and human judgment.
Trust Hacked is a battle-tested guide for building antifragile organizations where trust is engineered to withstand pressure, recover from failure, and become a lasting competitive advantage.
Zielgruppe
Professional Practice & Development, Professional Reference, and Professional Training
Autoren/Hrsg.
Fachgebiete
- Mathematik | Informatik EDV | Informatik Computerkommunikation & -vernetzung Netzwerksicherheit
- Mathematik | Informatik EDV | Informatik Technische Informatik Computersicherheit Kryptographie, Datenverschlüsselung
- Wirtschaftswissenschaften Betriebswirtschaft Unternehmensorganisation, Corporate Responsibility Unternehmensethik
Weitere Infos & Material
Introduction – Trust Is the Hidden Vulnerability. Why "Turn Left" Is a Metaphor for Leadership Decisions. The Trust Breakdown in Tech, Teams, and Institutions. Why Trust Isn't a Soft Skill (And Never Was). Overview of the Trust Protocol. The Trust Protocol™. Chapter 1 – Why Everything Breaks Without Trust. The Anatomy of a Breach: What Mistrust Looks Like. Fear, Silence, and Ignored Alerts. The Cost of Team Hesitation. Lessons from Cyber Incidents. Defining the Tool: Beyond Traditional Approaches. Fear, Silence, and Ignored Alerts: The Human Vulnerability Layer. The Cost of Team Hesitation: Quantifying Trust Failures. Lessons from Cyber Incidents: Building Antifragile Trust Systems. Tool: Trust Breakdown Checklist. The Competitive Advantage of Systems Thinking. The Path Forward. Chapter 2 – Authentication: Show Me You're Real. What Cybersecurity Gets Right About Identity. The Cost of Inconsistent Leadership. "False Logins" in Workplace Behavior. The Commitment Audit. Tool: Trust Incident Response Simulator (TIRS). Role-Based Scripts and Facilitator Guidance. Escalation Cues and Debrief Templates. Scoring Matrix for Recovery Effectiveness. Advanced TIRS Applications. Practical Knowledge. Chapter 3 – Encryption: Protect What Matters. What Is Emotional Encryption? Breaking Trust Through Oversharing and Silence. Psychological Safety Culture. Boundary-Setting for Leaders. Tools: Vulnerability Map and Encrypted Communication Framework. The Vulnerability Map. The Encrypted Communication Framework. Chapter 4 – Resilience: Trust Will Break. Prepare for It. The Myth of Unbreakable Trust. Planning for the Inevitable Trust Breakdown. Recovery as a System, Not a Reaction. How to Bounce Back with Credibility. Building the Trust Breach Playbook. Maintaining Psychological Safety Through Conflict. The Resilience Grid: Mapping Organizational Trust Vulnerabilities. Breach Repair Checklist and Implementation Guide. Competitive Advantage Through Resilient Trust. Conclusion: The Antifragile Organization. Chapter 5 – The Human Firewall: Culture is Security. What It Means to Be a Human Firewall. Micro-Behavior Monitoring and Cultural Drift. Inclusion as an Early-Warning System. Team-Based Trust Rituals. Tools: Inclusion Scorecard and Culture Temperature Check. Inclusion Scorecard. Culture Temperature Check. Chapter 6: Trust as Code: Embedding It Everywhere. What Does Operational Trust Look Like? The Operational Trust Audit. Procurement and Vendor Management: Trust at the Boundary. Decision-Making Protocols: Transparency in Action. The Escalation Ladder: Making It Safe to Speak Up. Feedback Loops: Learning from Everything. The Trust Audit: Regular System Check-Ups. Conclusion: From Infrastructure to Culture. Chapter 7: Leading in the Age of AI, Automation, and Ethics. The Black Box at 10,000 Feet. Trusting Systems We Can't See. Algorithmic Fairness, Bias, and Explainers. Human Oversight in Automated Environments. Tools: Future Risk Matrix and AI Trust Framework. The Future Risk Matrix. The AI Trust Framework. Conclusion: You Are The Protocol. Daily Trust Rituals: The Operational Discipline of Leadership. Leading Through Protocol, Not Personality. The Real Legacy of A Leader. The Turn Ahead. Abbreviations & Glossary of Terms.




