Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 42;   October 18, 2023: Exploitation and Conversational Narcissism at Work: I

Exploitation and Conversational Narcissism at Work: I

by

Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are five examples that emphasize exploitation of others.
A horserace, which is a useful metaphor for the abuser's view of a conversation

A horserace, which is a useful metaphor for the abuser's view of a conversation. To the abuser, the conversation is a competition for dominance, and there can be only one winner. A tactic available to the abuser is analogous to a tactic often employed in racing. Specifically, the jockeys exploit other horses as barriers, so as to obstruct horses that they expect might overtake the horse they're riding. This concept underlies the phrase, "to jockey for position." Image by EvgeniT courtesy Pixabay.

This exploration of conversational narcissism began with "Self-Importance and Conversational Narcissism at Work: I," Point Lookout for October 4, 2023, with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or in directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post introduces the narcissistic behaviors that are most closely associated with exploiting other participants in the conversation.

A bit of terminology

In that In one pattern, the abuser can derail
the conversation by opening a new topic
with which only the abuser is familiar
earlier post I introduced the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. In general, it's the behavior that is narcissistic, not the person exhibiting the behavior (though some who exhibit the behavior are narcissists). And I described ploys abusers use and which are associated with a sense of self-importance of the abuser.

In what follows, as in the previous posts in this series, I describe someone as "having the talking stick" if he or she is the person whom the conversation participants acknowledge as the current speaker. (The term speaker won't do, because someone else might be speaking too.)

Guided by the work of Vangelisti, et al., I've collected ten different patterns abusers use and which are associated with exploiting other conversation participants. [Vangelisti 1990]

Patterns of conversational narcissism that are associated with exploitation of others

In this post I describe four patterns abusers use to exploit the other conversation participants. This first set of four includes patterns used to control who has the talking stick. They include indirectly directing, unfairly claiming sole agency, using statements that require the auditor to respond, and using masked enthymemes.

Descriptions follow. Next time I describe six more patterns associated with exploiting others.

Indirectly directing
Abusers can direct the focus of attention onto themselves using a variety of transparent ploys. For example, an abuser can derail the conversation by opening a new topic with which only the abuser is familiar. But subtler tactics are also available. An abuser can offer information (call it A) that connects to a topic of special interest to the abuser, but as yet unmentioned, (call it B). Typically, this is done in a manner that conceals the connection between A and B. When the conversation eventually turns to B, the A-B connection is likely to become clear, at which point the abuser can take control of the conversation.
Unfairly claiming sole agency
When discussing a topic with which many are familiar, or a project that involved several participants, the abuser can use "I" statements that should properly be "We" statements. To those unfamiliar with the topic, the abuser would seem to be the leader or resident expert, whether or not that impression is accurate.
Using statements that require the auditor to respond
Nofsinger [Nofsinger 1975] defines a "demand ticket" as an utterance such as "Guess what?" which requires the auditor to respond. Examples:
  • When do you think scientists predict global warming will be irreversible?
  • Guess how many X occurred last year?
  • I've heard that, too, but you know what?
Abusers can use demand tickets to establish and maintain a false power position in the conversation. They are effective because they place the abuser in a position analogous to the conductor of an orchestra.
Using masked enthymemes
An enthymeme is a form of logical argument. There are several types, but the type that lends itself to exploiting others is called a truncated syllogism. Example of an enthymeme: "Socrates is mortal because he's human." This enthymeme is the truncated form of a formal syllogism, specifically:
  • All humans are mortal.
  • Socrates is human.
  • Therefore, Socrates is mortal.
What has been truncated in the enthymeme is the first statement of the formal syllogism, namely, "All humans are mortal."
A masked enthymeme is a truncated enthymeme in which the truncated step of the syllogism is so obscure or so little known that the enthymeme appears to be logically incorrect. Abusers use masked enthymemes to compel auditors to ask for explanations. Wielded by a skilled abuser, the masked enthymeme is a tool of humiliation.

Last words

Exploiting other conversation participants is unpleasant for those exploited, but the pattern can also harm the organization in material ways. By exploiting others, the abuser gains power and control unrelated to the organizational value of the abuser's performance as a member of the organization. And that can lead the organization to commit to efforts unjustified by potential results. First in this series  Next in this series Go to top Top  Next issue: Exploitation and Conversational Narcissism at Work: II  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Vangelisti 1990]
Anita L. Vangelisti, Mark L. Knapp, and John A. Daly. "Conversational narcissism." Communications Monographs 57:4 (1990), pp. 251-274. Available here. Retrieved 16 September 2023. Back
[Nofsinger 1975]
Robert E. Nofsinger, Jr. "The demand ticket: A conversational device for getting the floor," Communications Monographs, 42:1, pp. 1-9. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

American dwarf mistletoe (Arceuthobium americanum)Action Item Avoidance
In some teams, members feel so overloaded that they try to avoid any additional tasks. Here are some of the most popular patterns of action item avoidance.
A set of wrenches from a toolkitEffects of Shared Information Bias: I
Shared information bias is the tendency for group discussions to emphasize what everyone already knows. It's widely believed to lead to bad decisions. But it can do much more damage than that.
Truth and LiesBarriers to Accepting Truth: I
In workplace debates, a widely used strategy involves informing the group of facts or truths of which some participants seem to be unaware. Often, this strategy is ineffective for reasons unrelated to the credibility of the person offering the information. Why does this happen?
An abandoned railwayPerfectionism and Avoidance
Avoiding tasks we regard as unpleasant, boring, or intimidating is a pattern known as procrastination. Perfectionism is another pattern. The interplay between the two makes intervention a bit tricky.
A blue peacock of IndiaSelf-Importance and Conversational Narcissism at Work: I
Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing the participant's sense of self-importance.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A dangerous curve in an icy roadComing May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of miscommunications. Here's Part 2 of a collection of antipatterns that arise in communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.
And on May 8: Antipatterns for Time-Constrained Communication: 3
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 3 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing past experiences of participants. Available here and by RSS on May 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.