Liran Weizman

42%
Flag icon
The interaction he describes can be called a vulnerability loop. A shared exchange of openness, it’s the most basic building block of cooperation and trust. Vulnerability loops seem swift and spontaneous from a distance, but when you look closely, they all follow the same discrete steps: 1. Person A sends a signal of vulnerability. 2. Person B detects this signal. 3. Person B responds by signaling their own vulnerability. 4. Person A detects this signal. 5. A norm is established; closeness and trust increase.
The Culture Code: The Secrets of Highly Successful Groups
Rate this book
Clear rating
Open Preview