Feeds

Monkey poo probe reveals secrets of middle-management brains

If you have any, fling it now

Remote control for virtualized desktops

It might be tough at the top, or at the bottom - but it's even tougher in the middle.

That's the claim made by boffins from Liverpool and Manchester universities who say their study of monkeys proves that middle managers suffer more stress than anyone else.

'If you could go ahead and remember to do that from now on'

Katie Edwards, from Liverpool’s Institute of Integrative Biology, spent almost 600 hours observing female Barbary macaques at Trentham Monkey Forest in Staffordshire.

She watched one specific female over the course of a day, noting down every interaction with other monkeys, ranging from fights to grooming or "hind-quarter presentation", more commonly known in the human world as mooning.

What she found was that monkeys in the middle of the hierarchy were forced into conflicts with animals both above and below them in a bid to maintain their status in the group.

When she then tested the middle monkeys' faeces, there were considerably higher levels of stress hormones.

Edwards suggested the results might prove that human middle managers have a harder time than their bosses and their underlings.

She said:

It’s possible to apply these findings to other social species too, including human hierarchies. People working in middle management might have higher levels of stress hormones compared to their boss at the top or the workers they manage. These ambitious mid-ranking people may want to access the higher-ranking lifestyle which could mean facing more challenges, whilst also having to maintain their authority over lower-ranking workers.

Dr Susanne Shultz, a Royal Society University Research Fellow in the Faculty of Life Sciences at The University of Manchester, supervised the research.

She said:

What we found was that monkeys in the middle of the hierarchy are involved with conflict from those below them as well as from above, whereas those in the bottom of the hierarchy distance themselves from conflict. The middle ranking macaques are more likely to challenge, and be challenged by, those higher on the social ladder.

After studying stressed out simians, Edwards is now studying horny rhinos at Chester Zoo. She hopes her examination of sexy hormones in the animals will encourage them to breed.

Edwards' research is published in the journal General and Comparative Endocrinology, here. ®

Remote control for virtualized desktops

More from The Register

next story
Antarctic ice THICKER than first feared – penguin-bot boffins
Robo-sub scans freezing waters, rocks warming models
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Your PHONE is slowly KILLING YOU
Doctors find new Digitillnesses - 'text neck' and 'telepressure'
Reuse the Force, Luke: SpaceX's Elon Musk reveals X-WING designs
And a floating carrier for recyclable rockets
Britain's HUMAN DNA-strewing Moon mission rakes in £200k
3 days, and Kickstarter moves lander 37% nearer takeoff
Rosetta science team thinks Philae might come to life in the spring
And disclose the biggest surprise of Comet 67P
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.