
Margay cat (Leopardus wiedii). The Margay, also known as a tree ocelot, mimics the calls for help emitted by monkeys and other primates. After luring them within range, the Margay attacks and often secures a meal. Image (cc) which="by SA 3.0" by Malene Thyssen, courtesy Wikipedia.
When someone asks us for help, we sometimes have a positive, warm, emotional response. We can feel valued, flattered, respected, or appreciated. And often, these feelings fit the situation. The request for help validates our ability to contribute to the group effort. These feelings can be especially strong when we've had little contact with the person seeking help because these requests indicate something desirable about our reputations. Feeling respected and valued when you are actually respected and valued is an absolute good.
But people seek help for many reasons. Some do seek the help they're asking for, but others have hidden agendas. When people seek help for reasons other than the reasons they claim, there is a risk that destructive politics is afoot.
Below is a Feeling respected and valued when
you are actually respected and
valued is an absolute goodlittle catalog of situations that motivate people to ask for help for reasons beyond the help they appear to be seeking. It's useful to understand what motivates people to behave this way, and what you can do about these fake requests for help. In what follows, I'll refer to the Seeker of help as Sandra or Stephen, and the seeker's Target as Tom or Tilly. And I refer to the task in question as Marigold.
Here we go:
- Offloading work
- When trying to explain why Stephen might ask Tilly for help, getting someone else to do his work is one motive that comes to mind. Stephen might be overloaded. But he might also dislike the kind of work Marigold now requires. Or perhaps he anticipates a schedule conflict with some other task he prefers, or a conflict with a personal matter he doesn't want to disclose.
- Transferring or distributing risk
- Sandra might sense that working on Marigold entails some political risk that she would rather not bear. By enlisting Tom's assistance, she hopes to create an opportunity to mitigate some the risk by transferring it to Tom, in whole or in part. She might later be able to assert, "Oh, yes, that's the part of the work that Tom is doing."
- Creating delays
- Stephen might have an interest in delaying Marigold without being personally responsible for the delays. For example, one of Stephen's allies might be an advocate of an initiative that rivals Marigold strategically. By transferring some of the task to Tilly, Stephen hopes to slow progress in an excusable way for two reasons. First, Tilly is very busy with other work. And second, she's unfamiliar with the current status of Marigold and she'll need some time to familiarize herself with the task.
- Flattering the target
- Sandra might or might not actually need help with Marigold, but by asking Tom to help with the project, she hopes to flatter him — to communicate to him that she values and respects his contributions. Whether or not she actually feels that way is unimportant. Her request for help isn't sincere, and Tom would do well to maintain a skeptical stance with respect to Sandra's requests.
- Concealing ignorance or incompetence
- Among the more devious motives for Stephen to ask for help is his desire to conceal his inability to perform the work due to ignorance or incompetence. By recruiting Tilly, he can shift to her any part of the work that he doesn't understand. He might work alongside her if he wants to cast her in the role of tutor, to learn what he can, but that would be a relatively rare variant of this motive. More likely, he just wants Tilly to do the work, and then claim credit for much of her effort.
Last words
In Nature, these strategies are categorized as aggressive mimicry. For example, the margay cat has been observed emitting calls that emulate the calls for help among monkeys. When other monkeys approach, the cat attacks and often secures a meal. In the realm of organizational politics, people who use strategies like those described above are, in a sense, engaging in aggressive mimicry for the purpose of predation.
Rarely is a fake request for help the first fake request the seeker of help has ever made. If you suspect fakery, respond with caution. If you feel you can't decline outright, consider limiting what you offer, or delaying your availability. Limits and delays might compel the seeker of help to seek it elsewhere. Top
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcome
Would you like to see your comments posted here? rbrenEMudcCzvnDHFfOEmner@ChacTcmtXTCJBjZfSFjIoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Politics:
A Critique of Criticism: II
- To make things better, we criticize, but we often miss the mark. We inflict pain without meaning to,
and some of that pain comes back to us. How can we get better outcomes, while reducing the risks of
inflicting pain?
Group Problem-Solving Tangles
- When teams solve problems together, discussions of proposed solutions usually focus on combinations
of what the solution will do, how much it will cost, how long it will take, and much more. Disentangling
these threads can make discussions much more effective.
The End-to-End Cost of Meetings: I
- By now, most of us realize how expensive meetings are. Um, well, maybe not. Here's a look at some of
the most-often overlooked costs of meetings.
The End-to-End Cost of Meetings: II
- Few of us realize where all the costs of meetings really are. Some of the most significant cost sources
are outside the meeting room. Here's Part II of our exploration of meeting costs.
Conway's Law and Technical Debt
- Conway's Law is an observation that the structures of systems we design tend to replicate our communication
patterns. This tendency might also contribute to their tendency to accumulate what we now call technical debt.
See also Workplace Politics and Devious Political Tactics for more related articles.
Forthcoming issues of Point Lookout
Coming July 13: What Do We Actually Know?
- Precision in both writing and speech can be critical in determining the success of collaborations in the modern workplace. Precision is especially important when we distinguish between what we surmise or assume and what we actually know. Available here and by RSS on July 13.
And on July 20: Overt Verbal Abuse at Work
- Verbal abuse in the workplace involves using written or spoken language to disparage, to disadvantage, or to otherwise harm others. Perpetrators tend to favor tactics that they can subsequently deny having used to harm anyone. Available here and by RSS on July 20.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenEMudcCzvnDHFfOEmner@ChacTcmtXTCJBjZfSFjIoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Public seminars
- The Power Affect: How We Express Our Personal Power
Many
people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
- A recording of a program presented June 29, 2017, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
- A recording of a program presented June 29, 2017, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
- A recording of a program presented June 29, 2017, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
- Bullet Points: Mastery or Madness?
Decis
ion makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.
- A recording of a program presented June 24, 2020, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
- A recording of a program presented June 24, 2020, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
- A recording of a program presented June 24, 2020, Monthly
Webinar, sponsored by Technobility
Webinar Series. PMI members can earn 1.0 Category 'A' PDU by viewing this program. View this program now.
Follow Rick





Recommend this issue to a friend
Send an email message to a friend
rbrenEMudcCzvnDHFfOEmner@ChacTcmtXTCJBjZfSFjIoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
