Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 15, Issue 42;   October 21, 2015: Managing Wishful Thinking Risk

Managing Wishful Thinking Risk

by

When things go wrong, and we look back at how we got there, we must sometimes admit to wishful thinking. Here's a framework for managing the risk of wishful thinking.
The Satir Interaction Model as simplified by Weinberg

The Interaction Model of Virginia Satir, as simplified by Jerry Weinberg. The schematic suggests, misleadingly, that processing travels a linear path from Intake to Response. What actually happens inside us, expressed in terms of this simple model, is far more complex, with loops and jumps and intermediate results affecting re-processing of earlier results. But for our purposes of understanding wishful thinking, and for many other purposes as well, applying this model can yield an abundance of useful insights.

Wishful thinking is a means of reaching pleasing conclusions, maintaining preferred beliefs, or rejecting unfavorable beliefs. We think wishfully by cherry-picking evidence, bending the rules of rational thought, or creating substitutes for reality. Wishful thinking can be a source of risk in every human endeavor, whether we're rebuilding the U.S. Air Traffic Control system, or deciding whether or not to have a third child, or crossing a street in heavy traffic.

Because we can detect wishful thinking much more easily in others than in ourselves, tools for detecting it are important assets for people who must make decisions of consequence. For thinking about thinking, useful tools must be simple, because we need them while thinking about something else is actually happening. One such simple framework is the "Ingredients of an Interaction," a model of the person-to-person communication process developed by Virginia Satir [1]. For our Wishful Thinking interventions, we'll use an even simpler form of the Satir Interaction Model, due to Jerry Weinberg [2]. And instead of applying it to the case of person-to-person interaction, we'll be applying it to the more general case of person-World interactions.

For our purposes, the model describes the thought process that occurs from the moment we take in data from the World, to the moment when we execute a response to that data. The process has four stages, though we don't necessarily move through these stages in a strictly linear fashion. They are:

Intake
During Intake, Wishful thinking can be
a source of risk in every
human endeavor
we acquire information about the outside World. For example, we might receive a message that an "all hands" meeting will be held this afternoon at 3PM.
Meaning
Here we interpret the data we've acquired, and ascribe meaning to it. In our example, the meaning might be that we must attend an all-hands meeting at 3PM. There really isn't much more to it than that.
Significance
In this stage, we evaluate the significance of the meaning we made of the data. In our example, we might realize that we must reschedule our daily 3PM team meeting. Or we might begin to worry that layoffs are coming. Minds can easily boggle.
Response
Finally, we formulate and execute some kind of action. In our example, we might decide to notify the team that today's 3PM meeting is cancelled, and remind them that tomorrow's meeting will be held as usual. Or we might phone a trusted ally and suggest a meeting over coffee to discuss the layoffs.

That's the simplified form of the Satir Interaction Model. Our wishes, desires, and preferences can enter at any stage, and when they do, they do so in different ways peculiar to the stage involved. In coming weeks, we'll investigate how our wishes influence each stage of the process. Until then, think about which stage might be most vulnerable to wishful thinking for you.  Next in this series Go to top Top  Next issue: Wishful Thinking and Perception: I  Next Issue

[1]
Virginia Satir, John Banmen, Jane Gerber and Maria Gomori. The Satir Model: Family Therapy and Beyond. Palo Alto, CA: Science & Behavior Books, 1991. See pp. 124-128. Order from Amazon.com
[2]
Gerald M. Weinberg. Quality Software Management Volume 2: First-Order Measurement. New York: Dorset House, 1993. See pp. 2-3. Order from Amazon.com

52 Tips for Leaders of Project-Oriented OrganizationsAre your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenFeWEENVsZVrCYbomner@ChacDtXjdvMEpswfpGiVoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Project Management:

An air traffic controller using a display system at an Air Route Traffic Control CenterRemote Facilitation in Synchronous Contexts: I
Whoever facilitates your distributed meetings — whether a dedicated facilitator or the meeting chair — will discover quickly that remote facilitation presents special problems. Here's a little catalog of those problems, and some suggestions for addressing them.
USS Indianapolis' last Commanding Officer, Captain Charles B. McVay, IIIThe Politics of Lessons Learned
Many organizations gather lessons learned — or at least, they believe they do. Mastering the political subtleties of lessons learned efforts enhances results.
Congestion on a U.S. highwayNonlinear Work: When Superposition Fails
Much of the work we do is confounding, because we consistently underestimate the effort involved, the resources required, and the time required to get it done. The failure of superposition can be one reason why we get it wrong.
Robert F. Scott and three of his party arrive at a tent left by Roald Amundsen near the South PoleManaging Non-Content Risks: I
When project teams and their sponsors manage risk, they usually focus on those risks most closely associated with the tasks — content risks. Meanwhile, other risks — non-content risks — get less attention. Among these are risks related to the processes and politics by which the organization gets things done.
Lt. Gen. Donald Kutyna, Ret., when he was Commander of the U.S. Space CommandMore Obstacles to Finding the Reasons Why
Retrospectives — also known as lessons learned exercises or after-action reviews — sometimes miss important insights. Here are some additions to our growing catalog of obstacles to learning.

See also Project Management and Problem Solving and Creativity for more related articles.

Forthcoming issues of Point Lookout

A review meetingComing December 13: Reframing Revision Resentment: II
When we're required to revise something previously produced — prose, designs, software, whatever, we sometimes experience frustration with those requiring the revisions. Here are some alternative perspectives that can be helpful. Available here and by RSS on December 13.
Raquel Welch (left) and Gilda Radner (right) from a @Cite{Saturday Night Live rehearsal, April 24, 1976And on December 20: Conceptual Mondegreens
When we disagree about abstractions, such as a problem solution, or a competitor's strategy, the cause can often be misunderstanding the abstraction. That misunderstanding can be a conceptual mondegreen. Available here and by RSS on December 20.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenPbZdEnfhCjegyBAHner@ChacyYOzBOzFtanUaObOoCanyon.com or (617) 491-6289, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

Person-to-Person Communications: Models and Applications
When Person-to-Person Communications: Models and Applicationswe talk, listen, send or read emails, read or write memos, or when we leave or listen to voice mail messages, we're communicating person-to-person. And whenever we communicate person-to-person, we risk being misunderstood, offending others, feeling hurt, and being confused. There are so many ways for things to go wrong that we could never learn how to fix all the problems. A more effective approach avoids problems altogether, or at least minimizes their occurrence. In this very interactive program we'll explain — and show you how to use — a model of inter-personal communications that can help you stay out of the ditch. We'll place particular emphasis on a very tricky situation — expressing your personal power. In those moments of intense involvement, when we're most likely to slip, you'll have a new tool to use to keep things constructive. Read more about this program. Here's a date for this program:

Ten Project Management Fallacies: The Power of Avoiding Hazards
Most Ten Project Management Fallaciesof what we know about managing projects is useful and effective, but some of what we know "just ain't so." Identifying the fallacies of project management reduces risk and enhances your ability to complete projects successfully. Even more important, avoiding these traps can demonstrate the value and power of the project management profession in general, and your personal capabilities in particular. In this program we describe ten of these beliefs. There are almost certainly many more, but these ten are a good start. We'll explore the situations where these fallacies are most likely to expose projects to risk, and suggest techniques for avoiding them. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.