Trust Hacked : What Firewalls, Failures, and the Frontlines Taught Me about Trust (Security, Audit and Leadership Series)

個数:
  • 予約
  • ポイントキャンペーン

Trust Hacked : What Firewalls, Failures, and the Frontlines Taught Me about Trust (Security, Audit and Leadership Series)

  • ウェブストア価格 ¥13,092(本体¥11,902)
  • CRC Press(2026/06発売)
  • 外貨定価 US$ 59.99
  • 【ウェブストア限定】洋書・洋古書ポイント5倍対象商品(~2/28)
  • ポイント 595pt
  • 現在予約受付中です。出版後の入荷・発送となります。
    重要:表示されている発売日は予定となり、発売が延期、中止、生産限定品で商品確保ができないなどの理由により、ご注文をお取消しさせていただく場合がございます。予めご了承ください。

    ●3Dセキュア導入とクレジットカードによるお支払いについて
  • 【入荷遅延について】
    世界情勢の影響により、海外からお取り寄せとなる洋書・洋古書の入荷が、表示している標準的な納期よりも遅延する場合がございます。
    おそれいりますが、あらかじめご了承くださいますようお願い申し上げます。
  • ◆画像の表紙や帯等は実物とは異なる場合があります。
  • ◆ウェブストアでの洋書販売価格は、弊社店舗等での販売価格とは異なります。
    また、洋書販売価格は、ご注文確定時点での日本円価格となります。
    ご注文確定後に、同じ洋書の販売価格が変動しても、それは反映されません。
  • 製本 Paperback:紙装版/ペーパーバック版/ページ数 176 p.
  • 言語 ENG
  • 商品コード 9781041172673

Full Description

Trust Hacked by Nia Luckey redefines leadership for the digital age, framing trust not as a soft skill but as critical infrastructure. Drawing on her military and cybersecurity background, Nia presents the Trust Protocol, a strategic, actionable framework modelled on cybersecurity principles. The book argues that trust, like a firewall, must be systematically designed, monitored, and maintained.

Through compelling stories and practical tools, Luckey explores three core pillars: Authentication (proving credibility through consistency), Encryption (creating psychological safety), and Resilience (planning for inevitable trust breaches). She provides leaders with diagnostics, playbooks, and rituals to embed trust into daily operations, teams, and organizational culture. The final chapters address leading through AI and automation, emphasizing ethical oversight and human judgment.

Trust Hacked is a battle-tested guide for building antifragile organizations where trust is engineered to withstand pressure, recover from failure, and become a lasting competitive advantage.

Contents

Introduction - Trust Is the Hidden Vulnerability. Why "Turn Left" Is a Metaphor for Leadership Decisions. The Trust Breakdown in Tech, Teams, and Institutions. Why Trust Isn't a Soft Skill (And Never Was). Overview of the Trust Protocol. The Trust Protocol™. Chapter 1 - Why Everything Breaks Without Trust. The Anatomy of a Breach: What Mistrust Looks Like. Fear, Silence, and Ignored Alerts. The Cost of Team Hesitation. Lessons from Cyber Incidents. Defining the Tool: Beyond Traditional Approaches. Fear, Silence, and Ignored Alerts: The Human Vulnerability Layer. The Cost of Team Hesitation: Quantifying Trust Failures. Lessons from Cyber Incidents: Building Antifragile Trust Systems. Tool: Trust Breakdown Checklist. The Competitive Advantage of Systems Thinking. The Path Forward. Chapter 2 - Authentication: Show Me You're Real. What Cybersecurity Gets Right About Identity. The Cost of Inconsistent Leadership. "False Logins" in Workplace Behavior. The Commitment Audit. Tool: Trust Incident Response Simulator (TIRS). Role-Based Scripts and Facilitator Guidance. Escalation Cues and Debrief Templates. Scoring Matrix for Recovery Effectiveness. Advanced TIRS Applications. Practical Knowledge. Chapter 3 - Encryption: Protect What Matters. What Is Emotional Encryption? Breaking Trust Through Oversharing and Silence. Psychological Safety Culture. Boundary-Setting for Leaders. Tools: Vulnerability Map and Encrypted Communication Framework. The Vulnerability Map. The Encrypted Communication Framework. Chapter 4 - Resilience: Trust Will Break. Prepare for It. The Myth of Unbreakable Trust. Planning for the Inevitable Trust Breakdown. Recovery as a System, Not a Reaction. How to Bounce Back with Credibility. Building the Trust Breach Playbook. Maintaining Psychological Safety Through Conflict. The Resilience Grid: Mapping Organizational Trust Vulnerabilities. Breach Repair Checklist and Implementation Guide. Competitive Advantage Through Resilient Trust. Conclusion: The Antifragile Organization. Chapter 5 - The Human Firewall: Culture is Security. What It Means to Be a Human Firewall. Micro-Behavior Monitoring and Cultural Drift. Inclusion as an Early-Warning System. Team-Based Trust Rituals. Tools: Inclusion Scorecard and Culture Temperature Check. Inclusion Scorecard. Culture Temperature Check. Chapter 6: Trust as Code: Embedding It Everywhere. What Does Operational Trust Look Like? The Operational Trust Audit. Procurement and Vendor Management: Trust at the Boundary. Decision-Making Protocols: Transparency in Action. The Escalation Ladder: Making It Safe to Speak Up. Feedback Loops: Learning from Everything. The Trust Audit: Regular System Check-Ups. Conclusion: From Infrastructure to Culture. Chapter 7: Leading in the Age of AI, Automation, and Ethics. The Black Box at 10,000 Feet. Trusting Systems We Can't See. Algorithmic Fairness, Bias, and Explainers. Human Oversight in Automated Environments. Tools: Future Risk Matrix and AI Trust Framework. The Future Risk Matrix. The AI Trust Framework. Conclusion: You Are The Protocol. Daily Trust Rituals: The Operational Discipline of Leadership. Leading Through Protocol, Not Personality. The Real Legacy of A Leader. The Turn Ahead. Abbreviations & Glossary of Terms.

最近チェックした商品