
Predators Around Cao Cao: How to Guard Against Manipulation and Sabotage
- Self-ProtectionBusiness Safety
- Categories:Personal Transformation Relationships Psychology
- Language:Russian(Translation Services Available)
- Publication date:June,2024
- Pages:272
- Retail Price:(Unknown)
- Size:146mm×213mm
- Publication Place:Russia
- Words:(Unknown)
- Star Ratings:
- Text Color:(Unknown)
Request for Review Sample
Through our website, you are submitting the application for you to evaluate the book. If it is approved, you may read the electronic edition of this book online.
Special Note:
The submission of this request means you agree to inquire the books through RIGHTOL,
and undertakes, within 18 months, not to inquire the books through any other third party,
including but not limited to authors, publishers and other rights agencies.
Otherwise we have right to terminate your use of Rights Online and our cooperation,
as well as require a penalty of no less than 1000 US Dollars.
Feature
★This book not only in-depth analyzes the vulnerabilities of the wealthy and successful, revealing how these weaknesses are exploited by manipulators. It also analyzes the motives and strategies of manipulators, and provides rich business cases and practical psychological skills. These contents will help readers better predict their own and others' behaviors and make effective decisions in business and personal life.
★This is a practical guide that can truly help you stay sober in complex environments and protect your own interests.
Description
The book points out that the higher a person's level of wealth and power, the more likely they are to become targets of dishonest people. These “predators” try to achieve personal wealth accumulation and career advancement by using their relationships with successful people and their property. This book in-depth analyzes the vulnerabilities of the wealthy, revealing how these weaknesses are exploited by manipulators. At the same time, the book discusses in detail the motives and strategies of manipulators, helping readers identify in advance those who may sabotage personal and business interests.
The book not only provides rich business cases but also combines Combat Neuro-Linguistic Programming (NLP) techniques and psychological principles to help readers better understand how the brain works, thereby avoiding mistakes and understanding their own and others' motives. It also introduces how to maintain a stable mindset, resist manipulation, and enhance personal strength. By learning simple psychological skills, readers can effectively deal with the weaknesses exploited by manipulators and avoid falling into traps.
This book integrates business and management experience, as well as analysis of the motives of social patients. These contents will help readers better predict their own and others’ behaviors and make effective decisions in business and personal life. Whether you are a company leader, business owner, or someone interested in manipulation, protection and prevention, this book will provide you with valuable guidance and practical tools.
Author
Director of the ICDS-Group Institute of Psychological Self-Defense, clinical psychologist, Combat Neuro-Linguistic Programming trainer expert, NLP Master Trainer, profile analysis expert, business trainer and business consultant, with an EMBA business education background. With her profound professional knowledge and practical experience, Yulia Lobach is committed to helping people identify and resist manipulative behaviors and protect their own interests.
Evgeny Spiritsa
An internationally renowned negotiation expert with 30 years of rich experience in human behavior research. He is committed to developing effective communication models and providing valuable guidance for people in negotiations and interpersonal interactions. As the founder of the Russian School of Tool-free Lie Detection and the founder of the Action Profiling Model, Mr. Spiritsa has achieved remarkable achievements in the field of lie detection and behavioral analysis. He also authored a profiling monograph for the Ministry of Internal Affairs, and is a teacher at Lomonosov Moscow State University and a consultant to the Investigative Committee, which fully reflects his profound attainments in academic and practical fields. In addition, Mr. Spiritsa is the owner of ICDS-GROUP.COM University, making important contributions to cultivating a new generation of negotiation experts and communication masters.
Contents
What Are Predators
Is There an Invincible Person? Myths and Reality
Who Needs This Knowledge
Context
Who We Are
What You Will Gain from Reading This Book
How to Use This Book
Why We Need to Know This
Part 1 How We Are Constructed. Understanding Ourselves and Predators
Chapter 1 Brass Pipe. Development Crisis
Chapter 2 Predators, Parasites and Ordinary People——Who Are They
Narcissists
Psychopaths
Dark Triad
Sadists
Other Toxic People
Can We Change Ourselves to Change Others?
Chapter 3 How Humans Make Decisions
Personality Structure
Reason and Subconscious
Chapter 4 Human Nature and Vulnerabilities
Motivations of Humans as Advanced Primates
Our Own People Are Always Right
Social Norms and Rules——Restrictions or Necessities for Personality?
The Intention of Any Action——Positive
Struggle or Interaction Between Humans and Animals
Chapter 5 Personality Parts and Internal Conflicts
Conflicts Between Personality Parts
The Impact of Personality Parts on Decision-Making
Everything Is Complex
“The Gatekeeper”
Chapter 6 Buridan's Ass
The Creation of Personality Conflicts
Can It Be Used in Reverse?
Chapter 7 Methods to Resolve Internal Conflicts
The Two Chairs Method
Reimpression
Chapter 8 Six Steps to the Peak. Or the Cliff. Dilts Pyramid
What Is the Dilts Logical Levels Pyramid
Personality Sabotage Within the Dilts Pyramid
Chapter 9 Shadow——The Hidden Power of the Dark Side
How to Understand One’s Own Shadow
Recognizing the Shadow
Chapter 10 Recruitment. Unmet Needs, Ideals, Dreams and the Dark Side
Unmet Needs
Values, Ideals
Complexes and the Dark Side
Dark Side Archetypes
What Is Recruitment
Part 2 The Most Common Manipulation Methods and Countermeasures
Chapter 11 How to Identify That You Are Being Manipulated
Chapter 12 Those Who Can Control Themselves Can Control Others. State Management
Maintaining State
Something Happened. Response Rules
Recovery After a Blow
Chapter 13 Why Friends and Those You Have Helped Are Unreliable
Jealousy
Gratitude
Chapter 14 Schizophrenic Pattern, or Double Bind
Verbal Double Bind Pattern (SFP)
Double Messages: Verbal and Non-verbal
Behavioral Double Bind Pattern
Suggestions After Double Bind
Chapter 15 Incitement
The Structure of Incitement
The Difference Between Incitement and Lies
Who Is Engaged in Incitement
Chapter 16 Guilt. Never Defend Yourself
Don't Defend, But Analyze
In Tough Communication Modes
Personal and Equal Relationships
Self-Criticism
Chapter 17 Problem Signs
Chapter 18 General Rules for Resisting Manipulation
Protection
Strategic Protection
How to Study People
Chapter 19 Psychological Armor: Dissociation, Autistic Tendencies
Three Perceptual Positions
Dissociation as a Magical Practice
Autism
Chapter 20 “Punctual Person” Strategy
Part 3 Inside the Company. Factors That May Threaten the Business and Leaders
Chapter 21 Leaders
Chapter 22 Cold Showers and Corporate Culture. Is It Worth Investing?
Chapter 23 Smearing Leaders. Gossip, Conspiracies
Gossip
Conspiracies in the Company
Chapter 24 Creating Symbiotic Relationships
Flattery, Compliments
New People Around, Quickly Establishing Symbiotic Relationships
Negotiations and Business Relationships
How to Get Rid of Strong Symbiotic Relationships
Chapter 25 The Role of Friends, Relatives and Other Intimate People in the Company
How to Deal with It
The Difference Between Workplace Friendship and Symbiosis
Chapter 26 Information Restriction. Blindfolds
Chapter 27 Karpman Triangle
Chapter 28 Sabotage of Self-Concept When Partnerships Break Down
Group Attacks
Simple Self-Recovery Methods
Finding Oneself Again
Chapter 29 Partnerships in Business
Chapter 30 Sabotage of Goals and Dreams. Negative Feedback
Part 4 Outside the Company. Dangers and Traps
Chapter 31 Business Recruitment
Preliminary Information Collection
Influence Target Map
Chapter 32 “Sweet Trap”. Temptation, Sexual Bonding
Love/Sexual Dependence
Love Attachment
Love Recruitment
Using Gender Differences
Chapter 33 Smearing the Company. Competitors’ Tricks
Chapter 34 Clip Hands, or Overton Window
Chapter 35 Sabotage of Cooperation, Friendship. Smearing
Chapter 36 Sound Personality——Guarantee of Success in Coping with Stressful Situations
Ending the Past
“I Am Good” Exercise
Conclusion
Glossary
References