Security Magazine logo
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
  • MANAGEMENT
  • PHYSICAL
  • CYBER
  • BLOG
  • COLUMNS
  • EXCLUSIVES
  • SECTORS
  • EVENTS
  • MEDIA
  • MORE
  • EMAG
  • SIGN UP!
cart
facebook twitter linkedin youtube
  • NEWS
  • Security Newswire
  • Technologies & Solutions
  • MANAGEMENT
  • Leadership Management
  • Enterprise Services
  • Security Education & Training
  • Logical Security
  • Security & Business Resilience
  • Profiles in Excellence
  • PHYSICAL
  • Access Management
  • Fire & Life Safety
  • Identity Management
  • Physical Security
  • Video Surveillance
  • Case Studies (Physical)
  • CYBER
  • Cybersecurity News
  • More
  • COLUMNS
  • Cyber Tactics
  • Leadership & Management
  • Security Talk
  • Career Intelligence
  • Leader to Leader
  • Cybersecurity Education & Training
  • EXCLUSIVES
  • Annual Guarding Report
  • Most Influential People in Security
  • The Security Benchmark Report
  • The Security Leadership Issue
  • Top Guard and Security Officer Companies
  • Top Cybersecurity Leaders
  • Women in Security
  • SECTORS
  • Arenas / Stadiums / Leagues / Entertainment
  • Banking/Finance/Insurance
  • Construction, Real Estate, Property Management
  • Education: K-12
  • Education: University
  • Government: Federal, State and Local
  • Hospitality & Casinos
  • Hospitals & Medical Centers
  • Infrastructure:Electric,Gas & Water
  • Ports: Sea, Land, & Air
  • Retail/Restaurants/Convenience
  • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
  • Industry Events
  • Webinars
  • Solutions by Sector
  • Security 500 Conference
  • MEDIA
  • Videos
  • Podcasts
  • Polls
  • Photo Galleries
  • Videos
  • Cybersecurity & Geopolitical Discussion
  • Ask Me Anything (AMA) Series
  • MORE
  • Call for Entries
  • Classifieds & Job Listings
  • Continuing Education
  • Newsletter
  • Sponsor Insights
  • Store
  • White Papers
  • EMAG
  • eMagazine
  • This Month's Content
  • Advertise
Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Want a YES Decision From Anyone?

By Russ Granger
October 8, 2008

In order to get what you want, learn how to persuade others by being the authority on a subject, according to Russ Granger.




You can have anything you want – yes – anything! All you have to do is persuade someone to decide to do what you want. The most successful people in the world are those who can get things done with and through others. By applying new scientific breakthroughs, it’s now quick and easy to get “Yes!” decisions and actions.

   
Before persuading others to say “Yes!” take a quick look at your decision process. Only when we understand how the brain makes decisions can we successfully influence others’ decisions.



Life’s Challenges

Let’s face it – life is a challenge. From the minute our eyes pop open in the morning until they close at night, we deal with an avalanche of decisions. Get out of bed now or snooze? What should I wear? What should I eat for breakfast? Which route should I take to work? Should I stop for gas now or on the way home? Listen to the news or a CD? Which CD?

   
At work it’s the same: Get that report out first or answer e-mails and voicemail? Take a call or let voicemail answer? What are the boss’ priorities? What are mine? Whose priorities get executed first?

   
All day long, requests and decisions drive activities. The need to decide is incessant; the issues never stop, never let up.

   
Dealing with this many decisions sounds difficult, and it could be. If we had to use logical reasoning and cognitive thinking, if we had to rationally evaluate and think through each decision, we’d be trapped, locked in place, unable to move in any direction as we analyze, evaluate, contemplate, measure and critique options. We’d wind up dazed and immobile. We’d go nuts!



Nature’s Triggers to the Rescue

Fortunately, nature, our emotion-based limbic system, has provided us with a highly effective, simple solution to enable us to easily get through each decision-making opportunity. That solution is our “internal navigation system” referred to in the book and PBS series “The Secret Life of the Brain.” This system resides in our brain’s emotional center and is activated by our personal databank of emotion-based internal triggers. The take away summary from the breakthrough live brain research is this: “We are not thinking machines. We are feeling machines that think”

   
What is a trigger? What is this powerful internal navigation tool that initiates automatic, quick, easy decisions? A trigger is an emotion-based gut-feeling shortcut that helps us avoid the pain of rational thinking, of laborious cognitive mental evaluation. We are pre-programmed to comply with other’s requests when the request activates the appropriate triggers.

   
The secret for persuasion success is determining which triggers can be activated for each situation. The weird irony of this need for quick, easy emotion-based triggers is that the more sophisticated and complex our lives get, the more information we have, the more we need and rely on simple ways to help us make decisions. The smart security executive understands this need and prepares his/her requests accordingly.

   
The science of live brain imaging documents that one emotion-based brain element, the amygdala, receives most outside stimulus requests for decisions. The amygdala has two choices: It can make an immediate emotion-based decision, tapping into the lifelong database we build; or, if no prior emotion is triggered, it can send the request to the pre-frontal cortex for lengthy, rational, time-consuming cognitive evaluation. Here’s a newly discovered scientific fact: Reason and logic do not persuade. They might back up an emotional decision, but they do not heavily influence the decision.

   
To get what you want through others you must activate their emotion based triggers.



How Do You Activate an Emotional Trigger?

One of the seven primary emotional triggers is the Authority Trigger. When we perceive someone is an authority, we usually act on his or her requests. What do you do when your doctor, the “authority,” gives you a prescription? Do you search the Internet and research the chemical compounds? Do you check the FDA Web site to evaluate the documentation for safety and efficacy? No. You get the prescription filled. The doctor’s authority triggered you to make a quick automatic decision.

   
How about your accountant, the financial “authority”? When he says, “file this way,” do you examine the 16,000 page tax code for logic and reason, or do you follow his advice? Again the authority trigger motivates a quick, non-thinking automatic decision.

   
How do you persuade the authority emotional trigger? Be the authority! Know your stuff. Do your homework. We give unthinking automatic compliance to those who have done the hard digging for us. Show the other person you are fully informed about the subject and that you can be trusted to give expert information. Create the right impression and the other person’s amygdale will perceive less risk, feel more assurance and trust. You’ll get the decision you want.

   
Each of the triggers can be activated to produce easy, automatic decisions and actions. In the most simplistic form, these triggers are: 

  • The Friendship Trigger – Activates trust and agreement through bonding
  • The Authority Trigger – Activates acceptance through expertise
  • The Consistency Trigger – Motivates consistency with past actions
  • The Reciprocity Trigger – Understands that when you give, you get
  • The Contrast Trigger – Structures contrasts to make one approach better than another
  • The Reason Why Trigger – Emotional reasons to make decisions and actions
  • The Hope Trigger – Instills positive expectations that persuade agreement

 Activate a combination of these triggers and you will get anything you want.

   
“The best route to persuasion is with reason and logic.” Aristotle wrote this 2,500 years ago; it took science 2,500 years to learn he was wrong. The brain just doesn’t work that way. We finally know how the brain really works in the decision process. Your simple approach: Work with the brain rather than against it. Activate the brain’s emotional triggers and achieve the results you seek. 

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Russ Granger is the founder of ProEd, an international training consultancy specializing in management, sales and personal productivity courses. To become more successful getting “Yes,” the decisions and actions you want from others, visit www.seventriggers.com


Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Security's Top Cybersecurity Leaders 2024

    Security's Top Cybersecurity Leaders 2024

    Security magazine's Top Cybersecurity Leaders 2024 award...
    Security Leadership and Management
    By: Security Staff
  • cyber brain

    The intersection of cybersecurity and artificial intelligence

    Artificial intelligence (AI) is a valuable cybersecurity...
    Cyber Tactics Column
    By: Pam Nigro
  • artificial intelligence AI graphic

    Assessing the pros and cons of AI for cybersecurity

    Artificial intelligence (AI) has significant implications...
    Logical Security
    By: Charles Denyer
Manage My Account
  • Security eNewsletter & Other eNews Alerts
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

Middle East Escalation, Humanitarian Law and Disinformation – Episode 25

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

The Money Laundering Machine: Inside the global crime epidemic - Episode 24

Security’s Top 5 – 2024 Year in Review

Security’s Top 5 – 2024 Year in Review

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

  • Crisis Response Team
    Sponsored byEverbridge

    Automate or Fall Behind – Crisis Response at the Speed of Risk

  • Perimeter security
    Sponsored byAMAROK

    Why Property Security is the New Competitive Advantage

Popular Stories

Rendered computer with keyboard

16B Login Credentials Exposed in World’s Largest Data Breach

Verizon on phone screen

61M Records Listed for Sale Online, Allegedly Belong to Verizon

Security camera

40,000 IoT Security Cameras Are Exposed Online

Fountain pen

Trump Administration Executive Order Changes Cybersecurity Policy

Red spiderweb

From Retail to Insurance, Scattered Spider Changes Targets

2025 Security Benchmark banner

Events

July 17, 2025

Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.

August 7, 2025

Threats to the Energy Sector: Implications for Corporate and National Security

The energy sector has found itself in the crosshairs of virtually every bad actor on the global stage.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Security Newswire

    Oh Yes He Did! A Thief Caught at ISC West

    See More
  • Security Spending Will Be a Smart Grid Decision with a Big Price Tag

    See More
  • travel-enews

    Crafting a “Yes, But” Travel Security Program

    See More

Related Products

See More Products
  • Whitepaper-Social-Media-3.gif

    Optimizing Social Media from a B2B Perspective

  • 9780367221942.jpg

    From Visual Surveillance to Internet of Things: Technology and Applications

  • school security.jpg

    School Security: How to Build and Strengthen a School Safety Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • eNewsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing

Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Cyber Tactics
    • Leadership & Management
    • Security Talk
    • Career Intelligence
    • Leader to Leader
    • Cybersecurity Education & Training
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • The Security Leadership Issue
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
    • Podcasts
    • Polls
    • Photo Galleries
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!