When asked a question such as "Is that correct?" some of us embark on paths that create trouble in our working relationships. For example, suppose Jan knows that the premise isn't correct, because she knows of at least one counterexample — call it X. Instead of responding, "No, it isn't correct, because of X," she begins forming a mental catalog of all possible counterexamples. If Jan receives the query in conversation, she pauses while she assembles her response. If she receives the query in email, she takes a day or two to do research.
That's why it takes Jan longer to respond than the person who asked the question expects. Often, people interpret these delays as shiftiness, evasiveness, or secretiveness. They might see her as being careful in her words, or plotting, or scheming, or taking time to manufacture lies or misleading responses, or lacking in confidence.
Questioners who fairly evaluate her responses are much less likely to make these erroneous conclusions. But some questioners don't want the complete responses Jan always delivers. Questioners who ask, "Is that correct" sometimes don't want a full catalog of the reasons why it isn't correct, and they ignore it when she delivers it. Their preferences thus lead them to misunderstand what takes Jan so long to respond.
By over-delivering, some people, like Jan, convey the impression of being untrustworthy, scheming, reluctant, or incompetent.
To avoid this problem, apply a general principle:
When asked for an opinion or judgment, and the request doesn't specify a need for a complete or absolutely reliable response, a partial and estimated response — delivered right now — might suffice. If you're unsure, deliver the short answer, then ask.
- Is this possible?
- If you know one reason why it's impossible, that might be enough. Offer it and ask if more are needed.
- Can you do it by Friday?
- One reason why you can't might be enough.
- Why is that so?
- If you know one possible explanation, provide it, acknowledging that it isn't 100% certain or complete.
- Who do you think can do this?
- This is a question about capability, not availability. A complete list might not be required.
- Can we do this for under $X?
- This just requires a By over-delivering, some people
convey the impression of being
reluctant, or incompetentyes-or-no answer. Yes can require significant research. No can be very easy.
- Who told you that? Or: Where did you hear that?
- A complete list isn't required. It might not be necessary to provide the date on which you were told, or the order in which various people told you.
- Would any changes be required to meet that requirement?
- If you know of one, then the answer is yes. You don't necessarily need to devise a complete, priority-ranked or cost-ranked list of all changes that would be required.
See "How to Create Distrust," Point Lookout for May 18, 2011, for a catalog of other behaviors that erode trust.
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrendNWWlVdNFfdkToLqner@ChacECktaBprXtsvYdRSoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Communication at Work:
- Corrosive Buts
- When we discuss what we care deeply about, and when we differ, the word "but" can lead us
into destructive conflict. Such a little word, yet so corrosive. Why? What can we do instead?
- Nasty Questions: I
- Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather,
they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's
political agenda. Here's part one a catalog of some favorite tactics.
- Have a Program, Not Just an Agenda
- In the modern organization, it's common to have meetings in which some people have never met —
and some never will. For these meetings, which are often telemeetings, an agenda isn't enough. You need
- Long-Loop Conversations: Clearing the Fog
- In virtual or global teams, conversations can be long, painful affairs. Settling issues and clearing
misunderstandings can take weeks instead of days, or days instead of hours. Here are some techniques
that ease the way to mutual agreement and understanding.
- The Limits of Status Reports: I
- Some people erroneously believe that they can request status reports as often as they like, and including
any level of detail they deem necessary. Not so.
Forthcoming issues of Point Lookout
- Coming November 22: Motivation and the Reification Error
- We commit the reification error when we assume, incorrectly, that we can treat abstract constructs as if they were real objects. It's a common error when we try to motivate people. Available here and by RSS on November 22.
- And on November 29: Manipulators Beware
- When manipulators try to manipulate others, they're attempting to unscrupulously influence their targets to decide or act in some way the manipulators prefer. But some targets manage to outwit their manipulators. Available here and by RSS on November 29.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenWrPotqBsspkXRMhxner@ChacrVvnpSufzewAnHDroCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- Ten Project Management Fallacies: The Power of Avoiding Hazards
- Most of what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.