Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 18, Issue 17;   April 25, 2018: Narcissistic Behavior at Work: VI

Narcissistic Behavior at Work: VI

by

Last updated: May 18, 2018

Narcissistic behavior at work distorts decisions, disrupts relationships, and generates toxic conflict. These consequences limit the ability of the organization to achieve its goals. In this part of our series we examine the effects of exploiting others for personal ends.
Mistletoe growing in abundance in the Wye Valley, Wales

Mistletoe growing in abundance in the Wye Valley, Wales. Mistletoe is a parasitic plant, which means that it derives significant nutrients from living plant hosts. These mistletoes are parasitic on trees.

Those who exploit others for their own ends are parasitic on those they exploit. They use others as sources of something they need. What they derive from others can be, for example, credit for producing value. But what they derive from others need not be of value to anyone else. It can also be conflict, suffering, or pain, if the exploiter's need is to see others engage in conflict, or to see others suffer. Photo courtesy Wikipedia.

In modern organizations, people working alone contribute only a small part of what their organizations do. For example, most knowledge work requires cooperation. If people can't get along with each other, they're unhappy, and their work usually suffers. One of the more common causes of hurt feelings and disrupted relationships is exploitation of one person by another for personal ends. People who feel they've been exploited sometimes retaliate, sometimes shut down, and sometimes depart for more hospitable and nurturing environments. All these outcomes harm the organization.

As a reminder, the behaviors and attitudes typically regarded as narcissistic are these:

Let's now have a closer look at the sixth item above: exploiting others for personal ends. For convenience in this series, I've been referring to the person exhibiting narcissistic behaviors and attitudes as either Nick or Nora. This time, it's Nick.

Illustrations
A typical A typical form of exploitation
is taking credit personally for
contributions others have produced
form of exploitation is taking credit personally for contributions others have produced, commonly called credit theft or credit appropriation. This behavior has a mate of the opposite polarity: blame shifting. By pre-emptively blaming others for failures, Nick avoids having to put on a defense about those failures. Other forms of exploitation include making others feel stupid and hijacking meetings.
Exploitation at work need not be work-related. For example, by suggesting the possibility of romantic involvement, one person can induce another to provide a favor. The reverse exchange is also possible: by using the power of one's position to provide a favor, or to threaten, one person can induce another to provide favors of a more intimate nature.
Description
The variety of ways Nick can exploit other people for his own ends is breathtaking. The overt acts of exploitation, such as those offered above as illustrations, are unsurprising. Of greater interest is covert exploitation.
Consider a somewhat common situation: contending for promotion. Nick might exploit the other contenders by arranging covertly to create traps for his competitors that might reduce their chances of promotion. He might spread rumors about them. If a contender's project needs the assistance of someone with rare skills, Nick might arrange for that person to be unavailable. Or Nick might charm others into forming a tight alliance that excludes the other contender. By these means he exploits the foibles and weaknesses of the other contenders to increase his own chances of promotion.
Homework: select another situation and work out how Nick's narcissistic exploitation of others to advance his own personal goals can distort the way that situation evolves.
Organizational risks
One common result of Nick's exploiting others for personal ends is distortion of the organization's perception of which people or groups are producing (or failing to produce) value. Consequently, organizational decision makers are at risk of making personnel decisions that are inconsistent with achieving organizational goals.
There are other effects less common but potentially more significant. For example, if Nick attains an elevated level of responsibility for determining organizational goals, he might choose to bias his decisions in the direction of his own personal advantage. When his decisions directly benefit himself or his family members, the conflict of interest is overt and usually preventable. But he can conceal his conflict of interest by conspiring covertly with other similarly situated individuals to "swap" decisions, each benefiting the other. See "Budget Shenanigans: Swaps," Point Lookout for May 14, 2003, for examples of swaps.
These examples of exploitation are less common only because Nick requires the ability to influence the direction of the enterprise. But they can produce substantial benefit for Nick, and substantial harm for the enterprise.
Coping tactics
As Nick's supervisor, two concerns are paramount. First, if Nick has engaged in narcissistic behavior often enough to alert you to the possibility that he exploits others, or the enterprise, for personal gain, wake up your inner detective. Interview Nick's potential targets privately to determine the truth about who creates value for the enterprise and who does not. Second, if Nick has significant decision-making authority, investigate his decisions closely enough to ensure that they are in true alignment with enterprise objectives. And don't rely on the appearance of legitimacy — look carefully for swaps.
As Nick's co-worker, be aware that he's probably much more adroit at exploiting you than you are at defending yourself from exploitation. Be alert to Nick's use of charm and deceit to induce you to make choices you wouldn't otherwise make. Trust your intuition.
As Nick's subordinate, if he's shown an inclination to take credit for the work of subordinates, make sure others know what you're working on. If Nick demands secrecy, or otherwise prevents you from making your contributions public, that's an indicator of elevated risk of credit theft. Make your work so spectacular and so ridden with subtleties that if Nick is asked about particular details, he cannot possibly explain them.

Next time, we'll examine ruthless disregard for the feelings of others. First in this series  Next in this series Go to top Top  Next issue: Narcissistic Behavior at Work: VII  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenusxQNYHMEnXczlCLner@ChacZQdHKlHBeWaQnZVjoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

USS Indianapolis' last Commanding Officer, Captain Charles B. McVay, IIIThe Politics of Lessons Learned
Many organizations gather lessons learned — or at least, they believe they do. Mastering the political subtleties of lessons learned efforts enhances results.
A fiddler crab, resident of the Ashepoo Combahee Edisto (ACE) Basin National Estuarine Research Reserve in South Carolina, USACommunication Traps for Virtual Teams: II
Communication can be problematic for any team, especially under pressure. But virtual teams face challenges that are less common in face-to-face teams. Here's Part II of a little catalog with some recommendations.
The Garden Tiger moth, Arctia cajaTelephonic Deceptions: I
People have been deceiving each other at work since the invention of work. Nowadays, with telephones ever-present, telephonic deceptions are becoming more creative. Here's Part I of a handy guide for telephonic self-defense.
Todd Park, United States Chief Technology OfficerProjects as Proxy Targets: II
Most projects have both supporters and detractors. When a project has been approved and execution begins, some detractors don't give up. Here's Part II of a catalog of tactics detractors use to sow chaos.
Desperation at workReframing Revision Resentment: I
From time to time, we're required to revise something previously produced — some copy, remarks, an announcement, code, the Mona Lisa, whatever… When we do, some of us experience frustration, and view the assignment as an onerous chore. Here are some alternative perspectives that might ease the burden.

See also Workplace Politics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

The end of the line for a railroad trackComing May 30: Chronic Peer Interrupters: I
When making contributions to meeting discussions, we're sometimes interrupted. Often, the interruption is beneficial and saves time. But some people constantly interrupt their peers or near peers, disrespectfully, in a pattern that compromises meeting outcomes. How can we deal with chronic peer interrupters? Available here and by RSS on May 30.
Mohandas K. Ghandi, in the 1930sAnd on June 6: Chronic Peer Interrupters: II
People use a variety of tactics when they're interrupted while making contributions in meetings. Some tactics work well, while others carry risks of their own. Here's Part II of a little survey of those tactics. Available here and by RSS on June 6.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenGxFxslfuEDyYueRLner@ChaceOhVtFqkoLHwrISroCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Technical Debt Management: Making the Business Case
This Technical Debt Management: Making the Business Caseprogram outlines the steps necessary for deploying a program for rational management of technical debt. For many organizations, adopting a program for rationally managing technical debt entails organizational change. And unlike some organizational changes, this one touches almost everyone in the organization, because technical debt isn't merely a technical problem. Technical debt manifests itself in technological assets, to be sure, but its causes are rarely isolated to the behavior and decisions of engineers. We can't resolve the problem of chronically excessive levels of technical debt by changing the behavior of engineers alone. Technical debt is the symptom, not the problem. In this program we outline the essential elements of an effective business case for adopting a rational technical debt management program. But this business case, unlike many business cases, cannot be captured in a document. We must make the case not only at the leadership level of the organization, but also at the level of the individual contributor. Everyone must understand. Everyone must contribute. We explore five issues that make technical debt so difficult to manage, and develop five guidelines for designing technical debt management strategies for the modern enterprise. Read more about this program. Here's a date for this program:

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program. Here's a date for this program:

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.