Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 4, Issue 12;   March 24, 2004: Intimidation Tactics: Touching

Intimidation Tactics: Touching

by

Last updated: August 8, 2018

Workplace touching can be friendly, or it can be dangerous and intimidating. When touching is used to intimidate, it often works, because intimidators know how to select their targets. If you're targeted, what can you do?

Taking notes on the slide Warren was displaying, Maria felt a looming presence to her right. She turned, and found herself nose-to-nose with Norton, who was gazing intently at her notepad, reading greedily. Recoiling, she rolled her chair back, and turned the page on her pad to cover it. She said to Norton, "May I help you?" With that, everyone around the conference table turned to look at her.

Unless the toucher
and touched are
close friends,
being touched
is often
intimidating
Norton replied, "Sheesh, don't be so sensitive! I couldn't make out Southwest revenue, that's all. 2.5 or 2.8?"

"2.5," she said, certain that he had been brazenly reading her notes. She wondered why, but didn't want to accuse him, certainly not in public. So she turned her back to him, and rolling her chair forward a foot, tuned back in to Warren's presentation.

Maybe Norton really couldn't read the slide, but perhaps he's an Intimidator, engaging in a form of boundary violation, a favorite tactic of intimidators. Personal space boundary violations, such as the one Maria just experienced, are among the most obvious in the workplace. And among these, perhaps the most upsetting involve touching.

Two fingers pointing at each otherEven in the workplace, touching can be a welcome symbol of friendship. But unless the toucher and the touched are close friends, being touched is often intimidating. Intended or not, intimidation is especially likely when:

  • The toucher is male and the touched female, or
  • The toucher has relatively more organizational power, or
  • The toucher is standing and the touched is seated, or
  • The toucher is physically larger.

Failing to respond to intimidating touching increases the likelihood of repetition. Even so, responding can be difficult, because it often occurs in public settings, where most of us are reluctant to confront a toucher. What works and what doesn't?

Once you're a target, you're a target
The Intimidator will find you. Avoiding him or her probably won't work.
Don't rely on witnesses
Most witnesses probably won't have noticed anything inappropriate. Intimidators often fly under the radar.
Retreat — don't retaliate
If the Intimidator puts a hand on you, step away, turning as necessary to break contact. Avoid retaliatory touching — it can escalate dangerously.
If power is involved, get help
If there is an organizational power differential between you (either way), get help from Human Resources. When you ask for help, have a log of incidents — dates, times, and places.
Confront in a safe setting
If you elect to confront, choose a setting in which you feel safe. At a minimum, safety should include guaranteed egress. Tell the toucher directly that the touching must end. Don't threaten, but project earnest seriousness.

Recognize that what drives intimidators is fear. If you can marshal the courage to respond, you'll be delighted with the outcome, and, most likely, you'll wonder why you didn't act sooner. Go to top Top  Next issue: The Hypothetical Trap  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenaZpAJQXGbreGWAkXner@ChackhfQfeiRymaEenMfoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

A thiefLooking the Other Way
Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking the other way is also risky. What are the risks of looking the other way?
A polar bear, feeding, on landResponding to Threats: III
Workplace threats come in a variety of flavors. One class of threats is indirect. Threateners who use the indirect threats aim to evoke fear of consequences brought about not by the threatener, but by other parties. Indirect threats are indeed warnings, but not in the way you might think.
A view of Hut Point, in Anarctica, base of the Discovery Expedition (1901-1904) of Robert. F. ScottCovert Bullying
The workplace bully is a tragically familiar figure to many. Bullying is costly to organizations, and painful to everyone within them — especially targets. But the situation is worse than many realize, because much bullying is covert. Here are some of the methods of covert bullies.
A U.S. Marine sniper wearing sniper camouflage gear known as a "ghillie" suitHow Targets of Bullies Can Use OODA: II
To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not sufficient — someone must make the bully stop. That's why counterattack is much more likely to work.
A human marionetteManipulators Beware
When manipulators try to manipulate others, they're attempting to unscrupulously influence their targets to decide or act in some way the manipulators prefer. But some targets manage to outwit their manipulators.

See also Workplace Bullying and Emotions at Work for more related articles.

Forthcoming issues of Point Lookout

The road to Cottonwood Pass, ColoradoComing April 24: Big, Complicated Problems
Big, complicated problems can be difficult to solve. Even contemplating them can be daunting. But we can survive them if we get advice we can trust, know our resources, recall solutions to past problems, find workarounds, or as a last resort, escape. Available here and by RSS on April 24.
Left Ventricular Assist Device (LVAD)And on May 1: Full Disclosure
The term "full disclosure" is now a fairly common phrase, especially in news interviews and in film and fiction thrillers involving government employees or attorneys. It also has relevance in the knowledge workplace, and nuances associated with it can affect your credibility. Available here and by RSS on May 1.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenJwcOGBTPLjkOyuSwner@ChacNQGbdYyuKmmRGzwboCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
101 Tips for Managing ConflictFed up with tense, explosive meetings? Are you the target of a bully? Learn how to make peace with conflict.
Reader Comments About My Newsletter
A sampling:
  • Your stuff is brilliant! Thank you!
  • You and Scott Adams both secretly work here, right?
  • I really enjoy my weekly newsletters. I appreciate the quick read.
  • A sort of Dr. Phil for Management!
  • …extremely accurate, inspiring and applicable to day-to-day … invaluable.
  • More
52 Tips for Leaders of Project-Oriented OrganizationsAre your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around.
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.
Comprehensive collection of all e-books and e-bookletsSave a bundle and even more important save time! Order the Combo Package and download all ebooks and tips books at once.