Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 44;   November 2, 2005: The Costs of Threats

The Costs of Threats

by

Threatening as a way of influencing others might work in the short term. But a pattern of using threats to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships, and create an atmosphere of fear.

As the meeting continued, and her task list grew, Ellie got anxious. Making any changes so close to the demonstration was risky at best. But the number and complexity of these changes meant that she would be working long hours under pressure. So she spoke up. "I'm getting a little worried," she began. "This is a lot of work, and it has to be done right or we could be in trouble."

Threatened and fearfulWarner didn't miss a beat. "We'll be in bigger trouble if it doesn't get done."

Threatening was one of Warner's favorite tactics, and Ellie had had enough. So she called him on it. "Oh? What kind of trouble?"

Warner escalated. "Do you like having a job?"

Ellie and Warner were now officially in a tangle — one of the many serious consequences of using threats as a tool of influence. Their relationship had been in tatters for a while, in part because of Warner's persistent use of threats.

People use threats
because threats seem to
be extremely cheap
People use threats because threats seem to be extremely cheap, if they work. Threats can achieve quick results for very little effort. All you have to do is deliver the threat. But the real costs are high, and they're often invisible to those who threaten.

Eroded credibility
To maintain the credibility of the threat tactic, occasional demonstrations are necessary. But since the goal of most threateners is influence or compliance, and since the threatened typically do comply, opportunities to carry out personal threats are rare. Over time, the threatener's credibility inevitably erodes.
Damaged relationships
Threats erode our sense of safety. They reduce our willingness to disclose anything that might add to our sense of fear. These conditions lead to distrust and speculation, and they make healthy relationships difficult.
Feelings of resentment
When threats are personal, as Ellie experienced with Warren, they can lead to resentment and an I'll-show-them attitude. For instance, the threatened might engage in conspiracies of silence or even of action. Those less comfortable with overtly destructive acts might choose passively destructive acts, such as withholding information about problems for which they aren't directly responsible.
Decline in motivation and creativity
People who feel threatened might begin to husband their output, reserving it for use when they need to respond to the next threat. Certainly the atmosphere on the job becomes unpleasant, and the thrills become hard to find. The threatened often adopt a get-through-the-day attitude.

If you're subjected to threats at work, and you notice the effects on your level of joy, do what you can to lift yourself above it. Recognize the emptiness of the threatener's toolkit, and resolve to find a different way to influence people yourself.

If you use threats now and then, I hope you'll look for alternatives. Or else. Go to top Top  Next issue: Empire Building  Next Issue

One form of threat people feel comfortable using is the indirect threat. The comfort comes from the ambiguity of the threat; if "caught," the threatener can claim, "Oh, I didn't mean that." Despite the indirectness, the threat is still destructive. For more on indirectness, see "The True Costs of Indirectness," Point Lookout for November 29, 2006.

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenUBROinGhFZYAcqiYner@ChacGRSerDzYQNkZBuPooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

Too much time on his handsHurtful Clichés: II
Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or "Nice to meet you." Some other clichés aren't harmless, but they're so common that we use them without thinking. Here's Part II of a series exploring some of these clichés.
Two bull elk sparring in Grand Teton National Park, WyomingWorkplace Bullying and Workplace Conflict: I
Bullying is unlike other forms of toxic conflict. That's why the tools we use to address toxic conflict simply do not work for bullying. In this Part I, we contrast bullying and ordinary toxic conflict.
Comparision of brain scans before and after a concussionMeeting Bullies: Advice for Chairs
Bullying in meetings is difficult to address, because intervention in the moment is inherently public. When bullying happens in meetings, what can you do?
Palm trees blowing in a hurricaneDealing with Rapid-Fire Attacks
When a questioner repeatedly attacks someone within seconds of their starting to reply, complaining to management about a pattern of abuse can work — if management understands abuse, and if management wants deal with it. What if management is no help?
An FBI SWAT team assists local law enforcement in New Orleans in August 2005The Paradox of Structure and Workplace Bullying
Structures of all kinds — organizations, domains of knowledge, cities, whatever — are both enabling and limiting. To gain more of the benefits of structure, while avoiding their limits, it helps to understand this paradox and learn to recognize its effects.

See also Workplace Bullying and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A review meetingComing December 13: Reframing Revision Resentment: II
When we're required to revise something previously produced — prose, designs, software, whatever, we sometimes experience frustration with those requiring the revisions. Here are some alternative perspectives that can be helpful. Available here and by RSS on December 13.
Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976And on December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenlUPiqgnSQsGHaPiYner@ChacJPoQhtrVHChdSwBJoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.