Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 14, Issue 7;   February 12, 2014: Some Hazards of Skip-Level Interviews: III

Some Hazards of Skip-Level Interviews: III

by

Skip-level interviews — dialogs between a subordinate and the subordinate's supervisor's supervisor — can be hazardous. Here's Part III of a little catalog of the hazards, emphasizing subordinate-initiated skip-level interviews.
Nemesis by Albrecht Durer

Nemesis, by Albrecht Dürer (1471-1528). Engraving, 329 x 229 mm, ca. 1501-1503. In Greek mythology, Nemesis was the god of "retributive justice," meting out justice to evildoers and the proud and haughty. This kind of retribution differs from the retribution a subordinate might face after initiating a skip-level interview. For a Bilbo bent on retribution, justice might not be a consideration. More likely, deterrence of any further interference by subordinates would be Bilbo's goal. Photo courtesy WikiMedia.org.

As we've seen, skip-level interviews present risks to supervisors who initiate them. But there are also risks for subordinates who initiate skip-level interviews, however informal or spontaneous they might be. Because subordinates who initiate skip-level interviews almost always seek redress of grievances against their supervisors, this type will be our focus. As in the earlier installments of this exploration, we'll use the name Frodo for the subordinate, Bilbo for the subordinate's supervisor, and Gandalf for Bilbo's supervisor.

Retribution
When Frodo initiates a dialog with Gandalf, Bilbo might become worried. The less Bilbo knows about the topics of the dialog, the more worried he is likely to become. If the dialog is conducted in private, and especially if its existence is hidden, Bilbo is more likely to feel that his performance is the topic and that Frodo is attacking him.
These risks are elevated when there is ongoing difficulty between Bilbo and Frodo. And such situations are exactly those in which Frodo is most likely to turn to Gandalf for assistance. Moreover, in times of difficulty between Bilbo and Frodo, Bilbo is likely to be most alert to contact between Frodo and Gandalf.
Even if Bilbo has no definite knowledge of the content of the Frodo-Gandalf dialog, he might assume the worst, and seek retribution for Frodo's supposed offense. Retribution is even more likely if Gandalf subsequently takes any action that leads Bilbo to believe that it resulted from the Frodo-Gandalf dialog. Frodo would be wise to seek an interview with Gandalf only if he believes that Gandalf will act responsibly, with discretion, and with appropriate care for Frodo.
Peer concerns
When Frodo's peers learn that Frodo and Gandalf are meeting (or have met), they might also become worried. Like Bilbo, their level of concern is inversely correlated with their level of knowledge of the content and existence of the dialog.
For example, Even if the supervisor has no
definite knowledge of the content of
the dialog between the subordinate
and the supervisor's supervisor, he
or she might assume the worst,
and seek retribution
if one of Frodo's peers is a favorite of Bilbo, he or she might worry that Frodo is complaining to Gandalf about favoritism, and that Gandalf's response might end the favoritism. This worry might lead to difficulty between Frodo and his peer.
Frodo's peers also present security risks with regard to the interview with Gandalf. If Frodo has been open about his desire to meet with Gandalf, and open about the appointment itself, then his peers might transfer this information to Bilbo, wittingly or not. If Bilbo's performance is indeed the topic of the meeting, Frodo would be wise to be discrete about the meeting, even with respect to his peers.

The most important risks for Frodo involve Bilbo's response. Initiating a meeting with Gandalf can expose Frodo to these very real risks. Unless Frodo is relatively certain that Gandalf will take effective action that will help Frodo, the risks probably outweigh the benefits. First in this series  Go to top Top  Next issue: Scope Creep and the Planning Fallacy  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenoJVjDEUwUiNqoPGmner@ChacGcyquJqZfQIaQWbAoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Devious Political Tactics:

Three-legged racing teamDevious Political Tactics: The Three-Legged Race
The Three-Legged Race is a tactic that some managers use to avoid giving one person new authority. Some of the more cynical among us use it to sabotage projects or even careers. How can you survive a three-legged race?
An inflatable aircraft of the U.S. Ghost Army in World War IIActive Deceptions at Work
Among the vast family of workplace deceptions, those that involve presenting fiction as reality are among the most exasperating, because we sometimes feel fooled or gullible. Lies are the simplest example of this type, but there are others, and some are fiendishly clever.
Gen. Douglas MacArthur (left) and Willie Keeler (right)Ten Approaches to Managing Project Risks: II
Managing risk entails coping with unwanted events that might or might not happen, and which can be costly if they do happen. Here's Part II of our exploration of coping strategies for unwanted events.
A computer mouse, the tool we use so often to hijack our own mindsPreventing Meeting Hijacking
Meeting leads, meeting Chairs, and facilitators must be prepared to deal with meeting hijackers. Hesitation, or any ineffectual action, enhances the hijacker's chances of success. Here are suggestions for preventing hijacking.
Bee with pollenDealing with Meeting Hijackings
When you haven't prevented a meeting hijacking, and you believe a hijacking is underway, what can you do? How can you regain control?

See also Devious Political Tactics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A review meetingComing December 13: Reframing Revision Resentment: II
When we're required to revise something previously produced — prose, designs, software, whatever, we sometimes experience frustration with those requiring the revisions. Here are some alternative perspectives that can be helpful. Available here and by RSS on December 13.
Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976And on December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenYcVkPjsmFdgGSpPJner@ChacSYbLzBrxnxEWQUpYoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.