Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 26;   July 6, 2022:

Fake Requests for Help

by

When a colleague asks for assistance, we can feel validated, even flattered. But not all requests for help are what they seem. The more devious amongst us can be endlessly creative in employing requests for help to achieve devious ends.
Margay cat (Leopardus wiedii)

Margay cat (Leopardus wiedii). The Margay, also known as a tree ocelot, mimics the calls for help emitted by monkeys and other primates. After luring them within range, the Margay attacks and often secures a meal. Image (cc) which="by SA 3.0" by Malene Thyssen, courtesy Wikipedia.

When someone asks us for help, we sometimes have a positive, warm, emotional response. We can feel valued, flattered, respected, or appreciated. And often, these feelings fit the situation. The request for help validates our ability to contribute to the group effort. These feelings can be especially strong when we've had little contact with the person seeking help because these requests indicate something desirable about our reputations. Feeling respected and valued when you are actually respected and valued is an absolute good.

But people seek help for many reasons. Some do seek the help they're asking for, but others have hidden agendas. When people seek help for reasons other than the reasons they claim, there is a risk that destructive politics is afoot.

Below is a Feeling respected and valued when
you are actually respected and
valued is an absolute good
little catalog of situations that motivate people to ask for help for reasons beyond the help they appear to be seeking. It's useful to understand what motivates people to behave this way, and what you can do about these fake requests for help. In what follows, I'll refer to the Seeker of help as Sandra or Stephen, and the seeker's Target as Tom or Tilly. And I refer to the task in question as Marigold.

Here we go:

Offloading work
When trying to explain why Stephen might ask Tilly for help, getting someone else to do his work is one motive that comes to mind. Stephen might be overloaded. But he might also dislike the kind of work Marigold now requires. Or perhaps he anticipates a schedule conflict with some other task he prefers, or a conflict with a personal matter he doesn't want to disclose.
Transferring or distributing risk
Sandra might sense that working on Marigold entails some political risk that she would rather not bear. By enlisting Tom's assistance, she hopes to create an opportunity to mitigate some the risk by transferring it to Tom, in whole or in part. She might later be able to assert, "Oh, yes, that's the part of the work that Tom is doing."
Creating delays
Stephen might have an interest in delaying Marigold without being personally responsible for the delays. For example, one of Stephen's allies might be an advocate of an initiative that rivals Marigold strategically. By transferring some of the task to Tilly, Stephen hopes to slow progress in an excusable way for two reasons. First, Tilly is very busy with other work. And second, she's unfamiliar with the current status of Marigold and she'll need some time to familiarize herself with the task.
Flattering the target
Sandra might or might not actually need help with Marigold, but by asking Tom to help with the project, she hopes to flatter him — to communicate to him that she values and respects his contributions. Whether or not she actually feels that way is unimportant. Her request for help isn't sincere, and Tom would do well to maintain a skeptical stance with respect to Sandra's requests.
Concealing ignorance or incompetence
Among the more devious motives for Stephen to ask for help is his desire to conceal his inability to perform the work due to ignorance or incompetence. By recruiting Tilly, he can shift to her any part of the work that he doesn't understand. He might work alongside her if he wants to cast her in the role of tutor, to learn what he can, but that would be a relatively rare variant of this motive. More likely, he just wants Tilly to do the work, and then claim credit for much of her effort.

Last words

In Nature, these strategies are categorized as aggressive mimicry. For example, the margay cat has been observed emitting calls that emulate the calls for help among monkeys. When other monkeys approach, the cat attacks and often secures a meal. In the realm of organizational politics, people who use strategies like those described above are, in a sense, engaging in aggressive mimicry for the purpose of predation.

Rarely is a fake request for help the first fake request the seeker of help has ever made. If you suspect fakery, respond with caution. If you feel you can't decline outright, consider limiting what you offer, or delaying your availability. Limits and delays might compel the seeker of help to seek it elsewhere. Go to top Top  

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenEMudcCzvnDHFfOEmner@ChacTcmtXTCJBjZfSFjIoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Ralph Waldo Emerson in 1846, in a charcoal portrait by artist Eastman JohnsonA Critique of Criticism: II
To make things better, we criticize, but we often miss the mark. We inflict pain without meaning to, and some of that pain comes back to us. How can we get better outcomes, while reducing the risks of inflicting pain?
Then-Capt. Elwood R. Quesada who became commanding general of the 9th Fighter Command in operation OverlordGroup Problem-Solving Tangles
When teams solve problems together, discussions of proposed solutions usually focus on combinations of what the solution will do, how much it will cost, how long it will take, and much more. Disentangling these threads can make discussions much more effective.
A virtual meeting of a particular fancy typeThe End-to-End Cost of Meetings: I
By now, most of us realize how expensive meetings are. Um, well, maybe not. Here's a look at some of the most-often overlooked costs of meetings.
The George Washington Bridge, spanning the Hudson River between Manhattan and Fort Lee, New JerseyThe End-to-End Cost of Meetings: II
Few of us realize where all the costs of meetings really are. Some of the most significant cost sources are outside the meeting room. Here's Part II of our exploration of meeting costs.
Bottom: Aerial view of the Forth Bridge, Edinburgh, Scotland. Top: Inside the Forth Rail Bridge, from a ScotRail 158 on August 22, 1999.Conway's Law and Technical Debt
Conway's Law is an observation that the structures of systems we design tend to replicate our communication patterns. This tendency might also contribute to their tendency to accumulate what we now call technical debt.

See also Workplace Politics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

A micrometer capable of measuring to |plusmn .01 mmComing July 13: What Do We Actually Know?
Precision in both writing and speech can be critical in determining the success of collaborations in the modern workplace. Precision is especially important when we distinguish between what we surmise or assume and what we actually know. Available here and by RSS on July 13.
A mallet. The same object can be either a tool or a weaponAnd on July 20: Overt Verbal Abuse at Work
Verbal abuse in the workplace involves using written or spoken language to disparage, to disadvantage, or to otherwise harm others. Perpetrators tend to favor tactics that they can subsequently deny having used to harm anyone. Available here and by RSS on July 20.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenEMudcCzvnDHFfOEmner@ChacTcmtXTCJBjZfSFjIoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.