In Part II of this discussion of threats, we examined direct threats. Direct threats are uncloaked, delivered personally, without apology, and with emotional force. We saw how they work and examined some possible responses. In this Part III, we'll turn to indirect threats.
The indirect threat is a seemingly clever tactic for making a threat without appearing to be a threatener. One form is: "If you do (or don't do) X, then they will do Y." For example, "If you don't meet your commitments, you'll have to answer to Joanne."
Direct threats and indirect threats do share something — they both derive power from fear. Direct threats evoke fear of the threatener; indirect threats evoke fear of a third party or a force of nature.
Compared to direct threats, indirect threats seem to the threatener to cause less damage to the relationship between the threatener and the threatened. By making a third party the source of pain and fear, the threatener hopes to gain plausible deniability for the threat. The threatener thereby adopts a pose characterized by, "It was a warning, not a threat."
But sadly for the threatener, indirectness doesn't really provide the insulation sought, especially if the threatener is a leader or a manager of the threatened. Because indirect threats attribute superior power to a third party, those threatened tend to look upon indirect threats as indications of weakness or cowardice on the part of the threatener. They might ask, "Why doesn't he protect us from them?"
Challenging indirect threats is even less effective than challenging direct threats, because a third party is the supposed source of fear and pain. When challenged, the threatener can reply, in our example, "Hey, don't talk to me, talk to Joanne." Or, "Look, it's out of my hands, just get it done." To challenge the threat, you must confront the third party, which can be especially risky if the threat is fictitious.
Working as Challenging indirect threats
is even less effective
direct threatsa subordinate of someone who uses indirect threats as a management or negotiation technique is risky. First, credibility is an issue. Is the threat real? Can it be confirmed? Is it really true that nothing can be done about the threatened consequences? Working for someone who manufactures or misrepresents facts isn't a good place to be.
Second, the indirectness suggests a self-image of weakness on the part of the threatener, which often accompanies actual political weakness. The threatener's organization is thus a ripe target for those peers of the threatener bent on advancing their own status by acquiring or wrecking their peers' organizations. Consider moving on, internally or externally, but soon. If you're likely to have a new boss in the near future, it might be better to choose one yourself than to have one chosen for you. First in this series Top Next Issue
Are you being targeted by a workplace bully? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just USD 9.99. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenCCTPMVZkXxYDRKcXner@ChackxTGRLQIctnCwsEYoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- Some Truths About Lies: II
- Knowing when someone else is lying doesn't make you a more ethical person, but it sure can be an advantage
if you want to stay out of trouble. Here's Part II of a catalog of techniques misleaders use.
- What Is Workplace Bullying?
- We're gradually becoming aware that workplace bullying is a significant deviant pattern in workplace
relationships. To deal effectively with it, we must know how to recognize it. Here's a start.
- How Workplace Bullies Use OODA: II
- Workplace bullies who succeed in carrying on their activities over a long period of time are intuitive
users of Boyd's OODA model. Here's Part II of an exploration of how bullies use the model.
- See No Bully, Hear No Bully
- Supervisors of bullies sometimes are unaware of bullying activity in their organizations. Here's a collection
of indicators for supervisors who suspect bullying but who haven't witnessed it directly.
- Shame and Bullying
- Targets of bullies sometimes experience intense feelings of shame. Here are some insights that might
restore the ability to think, and maybe end the bullying.
Forthcoming issues of Point Lookout
- Coming March 28: Four Overlooked Email Risks: II
- Email exchanges are notorious for exposing groups to battles that would never occur in face-to-face conversation. But email has other limitations, less-often discussed, that make managing dialog very difficult. Here's Part II of an exploration of some of those risks. Available here and by RSS on March 28.
- And on April 4: Narcissistic Behavior at Work: III
- People who behave narcissistically tend to regard themselves as special. They systematically place their own interests and welfare ahead of anyone or anything else. In this part of the series we consider how this claimed specialness affects the organization and its people. Available here and by RSS on April 4.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenQIziZimnBHKBumfhner@ChacvvcwIbrBaeGjoFyqoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.