Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 49;   December 6, 2023: Off-Putting and Conversational Narcissism at Work: III

Off-Putting and Conversational Narcissism at Work: III

by

Having off-putting interactions is one of four themes of conversational narcissism. Here are six behavioral patterns that relate to off-putting interactions and how abusers use them to control conversations.
What a videoconference looks like when all participants have their cameras off

What a videoconference looks like when all participants have their cameras off. The possibility of human interaction is severely restricted.

This exploration of conversational narcissism began with "Self-Importance and Conversational Narcissism at Work: I," Point Lookout for October 4, 2023, with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions, biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

As noted in earlier posts, the methods of conversational narcissism can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with impersonal relationships.

A bit of terminology

Following the pattern of previous posts in this series, I begin with some introductory information, repeated here for convenience. If you recall those earlier posts well enough, you can skip this next bit.

In the first post of this series I introduced the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. In general, it's the behavior that's narcissistic, not the person exhibiting the behavior (though some who exhibit the behavior are narcissists).

In these posts, I describe someone as "having the talking stick" if the conversation participants acknowledge them as the current speaker. (The term speaker won't do, because someone else might be speaking too.)

Six patterns of conversational narcissism that are associated with impersonal relationships

Guided Conversational narcissism threatens organizational
wellbeing because it biases conversations in
ways preferred by individuals, and which might
not align with organizational interests
by the work of Vangelisti, et al., I've collected 17 different patterns abusers use and which are associated with impersonal relationships. [Vangelisti 1990] Although they use the term impersonal relationships to refer to this theme, I prefer off-putting interactions. My preference arises from my desire that the term cover interactions between people who don't have much of a relationship beyond the incident at hand. This might occur, for example, in the (relatively common) case of a cross-functional team or task force comprised of people who work together only rarely. Another example: making a case to a governance panel for a waiver of policy.

In the previous post I described five patterns abusers employ to create distractions that insert distance between themselves and other participants. In this post I examine — briefly — the use of cameras in videoconferences, and then explore how abusers handle and use questions.

Camera off in videoconferences
Videoconferencing is increasingly common these days, even for teams whose members are all or almost all co-located. Partly driven by work-from-home, and partly by chaotic travel schedules, videoconferencing is the way of things now. In the context of conversational narcissism, videoconferencing compels us to address the question of camera usage. Shall we require cameras to be enabled? Shall we require live, full-motion views of every meeting participant? (Aside: These last two sentences are examples of rhetorical questions. See below.)
Abusers recognize the power of turning off their cameras. Out of sight of the participants, abusers are free to engage in text messaging conversations with anyone, including other participants. And "camera-off" communicates a message of, "I'm too important for the drivel of this conversation. I'll attend this meeting live if it turns to topics that matter." When abusers want to, they can activate their cameras and join the meeting. And when they do that, other participants take notice and await the abuser's next pronouncement.
Nevertheless, adopting a cameras-on policy carries risks. Unless you're prepared to enforce the policy, abusers who defy the policy will be able to create with their defiance even more distance between themselves and other participants.
Using questions as tools of detachment
We generally regard questions as honest requests for insight or information. Most questions actually are tools of enlightenment. For abusers, though, questions serve another purpose. They separate abusers from everyone else. Separation is accomplished in a variety of ways, but let me describe just one.
Suppose the conversation is about to enter the domain of another participant — someone whom the abuser regards as a competitor for attention. A well-timed question about a different, unrelated topic can prevent the conversation from entering the competitor's domain. And if the topic of the question is in the abuser's "wheelhouse," the question serves to bring the conversation into territory where the abuser is dominant.
Asking themselves questions aloud and answering them
This figure of speech is an old one. It has a Greek name: hypophora. Perhaps an illustration will explain it best: "Have I ever seen this technique in use in a real meeting? Yes, of course. Does it actually work for abusers? Well, it's most likely to work if the other participants haven't yet given it a name or recognized it. Are there no other reasons why it works? There are, indeed — the other participants let it work."
Avoiding questions that lead away
If someone asks the abuser a question, and the answer leads along a path the abuser would rather not follow, the abuser balks. Several strategies will serve the abuser's purpose: (a) Interpret the question in a way that avoids the disfavored path; (b) Duck the question with a plausible yet meaningless excuse such as, "We'll have to see," or, "We're looking into that but I can't say much at this point," or, "Intriguing possibility, of course, but it's too early to say;" (c) Ask himself or herself a question, answer it, then move to a new topic. See "Asking themselves questions aloud and answering them."
Asking questions that are off topic
Asking off-topic questions does derail the conversation. But the skilled abuser crafts questions that redirect the conversation along a path the abuser prefers. An example of such a path is one that leads the group to appreciate more fully the abuser's true talents.
Abusers avoid asking — or indeed, they avoid even entertaining — questions that lead the group to appreciate anyone else, or to explore any topic the abuser would rather not see explored. One example: clarifying questions. The abuser rarely asks questions that clarify ambiguous points, unless the issue relates to some aspect of the abuser's agenda.
Asking rhetorical questions
Although the rhetorical question is a legitimate question in the grammatical sense, its function is not interrogatory. Usually, the rhetorical question is a device for making a point in an interesting way. It serves to compel auditors to silently devise answers, and in so doing, it commands their attention. The rhetorical question is thus a device almost designed for the abuser.
Abusers can use rhetorical questions to direct the thoughts of auditors along the lines abusers prefer. Having accomplished that feat, the abuser can then show the auditors the next step using another rhetorical question, or any other suitable device. In effect, the rhetorical question mitigates the risk of losing the talking stick after making one's point.

Last words

Over the course of these nine posts, I might have left the impression that I regard the abuser as someone who intentionally and for evil purposes employs the tactics I've identified. That does occur. I've witnessed it myself. But I suspect that most examples of these tactics in the wild occur outside the awareness of the people who use them. In most cases, I believe (without evidence) that the behaviors in question are associated with habits of long standing. And they can be replaced by new habits that are more constructive for all concerned.

This series has explored a variety of tactics available to any participant in any conversation. My focus has been the kind of conversation that occurs in meetings at work. Although I have described over 50 such tactics, I'm certain there are many more. Two paths open from this point for further work. One is elaboration of the set of tactics so far included to describe them in greater detail, and to include other tactics where possible. A second and more important path is a collection of responses to the tactics identified. The most effective defense against conversational narcissism is for participants in workplace conversations to be prepared to deal with these tactics in the moment. In workplaces so prepared, abusers are more likely to be deterred. And that is the most effective response.

If you recognize some of these tactics and would like my thoughts about effective responses, contact me: ChacoCanyon.com. First in this series  Go to top Top  Next issue: Contrary Indicators of Psychological Safety: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Water bottlesAn Agenda for Agendas
Most of us believe that the foundation of a well-run meeting is a well-formed agenda. What makes a "well-formed" agenda? How can we write and manage agendas to make meetings successful?
Senator Lindsey Graham (R-South Carolina) speaks at a recent Senate hearingOvert Belligerence in Meetings
Some meetings lose their way in vain attempts to mollify a belligerent participant who simply will not be mollified. Here's one scenario that fits this pattern.
Lady JusticePre-Decision Discussions: Emotions
Some meeting agendas include exploring issues related to upcoming decisions. Although we believe that these discussions lead to rational decisions, some contributions evoke possibly misleading emotional responses. Here are five examples.
A well-camouflaged mule deer being attended to by its motherThe Six Dimensions of Online Disinhibition: II
The online disinhibition effect appears in computer-mediated communications. It is due to relaxation of inhibitions that demand civility. It's still impactful 20 years after its identification, but it might be less so in today's workplace cyberspace.
The Arc de Triomphe in ParisExploitation and Conversational Narcissism at Work: II
Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are six examples that emphasize exploitation of others.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A dangerous curve in an icy roadComing May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of miscommunications. Here's Part 2 of a collection of antipatterns that arise in communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.
And on May 8: Antipatterns for Time-Constrained Communication: 3
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 3 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing past experiences of participants. Available here and by RSS on May 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.