The Herd Instinct

Strauchs, John J.
July 2008
Security: Solutions for Enterprise Security Leaders;Jul2008, Vol. 45 Issue 7, p44
Trade Publication
The article focuses on the propensity of man to ignore the most basic practice in security management. It outlines various best practices that are commonly ignored in security management, including identification badges, request to exit and security videos. It further relates that this tendency to ignore basic practices is caused by man's tendency to feel secure in being part of a large group.


Related Articles

  • Tanoc--Keeping the Bad Guys Out. Dodd, John // J@pan Inc.;Summer2005, Issue 64, p16 

    Presents information on the efforts of the home and office security industry in Japan in reducing crimes in 2005. Crime rates in 2002; Dominance of companies Secom and Sohgo Security Services in the industry; Quality of the security infrastructure and systems; Supply of video surveillance...

  • Building Security in Maturity Model Includes Bug-Bounty Programs. Kerner, Sean Michael // eWeek;10/30/2013, p1 

    The author focuses on the annual Building Security in Maturity Model (BSIMM), the revised 2013 platform which includes 112 best-practice activities for security frameworks, featuring an additional recommendation for organizations to have a bug-bounty program. He explores the security measures...

  • Here's a ringing endorsement for buying the right alarm. Mie-Yun Lee // Crain's Detroit Business;09/13/99, Vol. 15 Issue 37, p16 

    Explores key considerations in choosing security systems for offices. Types of electronic security systems; Convenience factors; Installation of security systems; Price range of office security systems. INSET: Office security tips..

  • the first lyrebird. Bodkin, Frances; Andrews, Gawaian Bodkin; Robertson, Lorraine // Wildlife Australia;Summer2008, Vol. 45 Issue 4, p34 

    The article offers an analogous resemblance of the old woman Wiritjiribin, a wise grandmother who cares for the children in times of wildfires to the instincts of lyrebirds for survival during times of danger. It narrates on the incident of the wildfire and the immediate responses of human and...

  • The Ideological Animal. Dixit, Jay // Psychology Today;Jan/Feb2007, Vol. 40 Issue 1, p80 

    The article talks about the political stance of people and its psychological impact. It cites an example on how some social issues and political conflicts have changed the attitude and personality of a person. This situations have drawn some people to the idea of self-preservation. People tend...

  • CHAPTER XIII: A LAWYER'S GOOD LADY. Munro, Neil // Doom Castle;1/ 1/1901, p46 

    Chapter 13 of the book "Doom Castle" is presented. It highlights the danger perceived by Count Victor that might happen to him relative to the murder of a Highland officer and attempted rescue of the suspect. It relates the unexpected meeting of the count and a French horseman, who looks...

  • Fight or Flight.  // Click;Jul/Aug2003, Vol. 6 Issue 6, p16 

    Discusses the fight or flight instinct of zebra for surviving predators. Self-preservation strategies of zebras; Senses that helps zebra detect danger; Advantages of zebras over its predator, the lion.

  • Day Dreaming: What's This World Coming To? Hunt, Steve // Security: Solutions for Enterprise Security Leaders;Jul2007, Vol. 44 Issue 7, p20 

    The article focuses on the significance of best security practices for the future of the security industry. According to the author, cyber crimes are increaing however, video surveillance has been developing and it is more beneficial for the business enterprise as long as it has a standard to...

  • Important benefits of keyless entry systems. DiPaolo, Richard // Cleaning & Maintenance Management;Jan2009, Vol. 46 Issue 1, p36 

    The article presents a discussion about the benefits of keyless entry systems. Keyless entry devices are playing an integral role in safeguarding a facility while keeping janitorial workers safe and productive. These modern systems save time and money. Each aspect of security, including...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics