10 of 14 people found the following review helpful
The power and impact of benevolent hacking in the workplace,
This review is from: Hacking Work: Breaking Stupid Rules for Smart Results (Hardcover)
To what does the title of this book refer? According to the co-authors, Bill Jensen and Josh Klein, "Today's top performers are taking matters into their own hands. They are bypassing sacred structures and breaking all sorts of rules just to get their work done...Every day in every workplace, benevolent rule breakers like these are ensuring that business succeeds despite itself. They are reinventing how to approach productivity and how to consistently achieve morebetterfaster results." Jensen and Klein urge their reader to start hacking: "Start taking the usual ways of doing things and work around them to produce improved results. Bend the rules for the good of all. That's what benevolent hackers do."
In his book Iconoclast, Gregory Berns explains, "The overarching theme of this book is that iconoclasts are able to do things that others say can't be done, because iconoclasts perceive things differently than other people." Berns goes on to explain that the difference in perception "plays out in the initial stages of an idea. It plays out in how their manage their fears, and it manifests in how they pitch their ideas to the masses of noniconoclasts. It is an exceedingly rare individual who possesses all three of these traits." In her article "How to Walk on the Leading Edge without Falling off the Cliff," Judith A. Neal calls these bold and principled people "Edgewalkers" whose dominant characteristics include visionary consciousness (they have a sense of mission about something greater than themselves), multicultural responsiveness (they can understand the nuances of different worlds or cultures), intuitive sensitivity (they are natural futurists who constantly integrate ideas and information from a variety of sources, risk-taking confidence (they have a strong sense of adventure and experimentation), and self-awareness (they understand and appreciate that each person is a unique microcosm of the whole). Benevolent hackers, values-driven iconoclasts, and Edgewalkers are kindred spirits.
Throughout their narrative, Jensen and Klein explain how to determine what to hack, how to hack effectively with benevolence, how to obtain the resources needed, how to sustain support of change initiatives, and how to support others' hacking. They provide "A Short History of Hacking's Journey from Good to Bad to Good" (Pages 15-16), discuss "Top Five Hacks That We'd Recommend That Everyone Do" (Pages 47-48) and how to proceed with each (Pages 53-54), they identify and discuss Hacking's "Ten Commandments" (Pages 59-65), then identify and discuss "Four Emerging Forces Where Hackers Will Influence the Outcomes" (Pages 88-113), then "Five Big Ideas" for a Boss to consider (Pages 132-255), and explain how and why a hacker must work differently (Pages 164-171) and lead differently (Pages 172-181).
All of the information, insights, and recommendations are based on more than 4,000 "benevolent hacking case studies." The material is anchored in real-world situations that suggest practical applications of key concepts. Jensen and Klein should also be commended on their brilliant use of reader-friendly devices such as Sidetrips (supplementary digressions), Smartstarts (key takeaways and recommended action steps), and Fasthacks (real-world examples that illustrate key points). As I read this book, I reflected back on all the organizations and on all the leaders with which I have been associated. When doing so, I realized that Jensen and Klein wrote the book for supervisors as well as for those for whom they are responsible.
In the ideal workplace, supervisors and their direct reports either hack or support those who do. However, more often than not, aspiring hackers are in fact inept politicians and supervisors who remain hostage to -- and are perhaps zealous defenders of -- what James O'Toole so aptly characterizes as "the ideology of comfort and the tyranny of custom." Here in a single volume is just about everything aspiring benevolent hackers and their supervisors need to know in order to co-create answers to their organization's most important business questions and co-create solutions to its most serious problems. Congratulations to Bill Jensen and Josh Klein on a brilliant achievement. Bravo!
Tracked by 1 customer
Sort: Oldest first | Newest first
Showing 1-1 of 1 posts in this discussion
Initial post: Dec 15, 2010 7:48:45 AM PST
S. Toth says:
it seems to ignore that stupid management people is an essential component to concentrate the power in the hands of few at the top. benevolent are welcome to improve efficiency but they are suppose to always remain buried under a layer of stupid management so theirs skills can never enter in competition with top people. if they work secretly it's even better actually.
‹ Previous 1 Next ›