Taking notes on the slide Warren was displaying, Maria felt a looming presence to her right. She turned, and found herself nose-to-nose with Norton, who was gazing intently at her notepad, reading greedily. Recoiling, she rolled her chair back, and turned the page on her pad to cover it. She said to Norton, "May I help you?" With that, everyone around the conference table turned to look at her.
Unless the toucher
and touched are
close friends,
being touched
is often
intimidatingNorton replied, "Sheesh, don't be so sensitive! I couldn't make out Southwest revenue, that's all. 2.5 or 2.8?"
"2.5," she said, certain that he had been brazenly reading her notes. She wondered why, but didn't want to accuse him, certainly not in public. So she turned her back to him, and rolling her chair forward a foot, tuned back in to Warren's presentation.
Maybe Norton really couldn't read the slide, but perhaps he's an Intimidator, engaging in a form of boundary violation, a favorite tactic of intimidators. Personal space boundary violations, such as the one Maria just experienced, are among the most obvious in the workplace. And among these, perhaps the most upsetting involve touching.
Even in the workplace, touching can be a welcome symbol of friendship. But unless the toucher and the touched are close friends, being touched is often intimidating. Intended or not, intimidation is especially likely when:
- The toucher is male and the touched female, or
- The toucher has relatively more organizational power, or
- The toucher is standing and the touched is seated, or
- The toucher is physically larger.
Failing to respond to intimidating touching increases the likelihood of repetition. Even so, responding can be difficult, because it often occurs in public settings, where most of us are reluctant to confront a toucher. What works and what doesn't?
- Once you're a target, you're a target
- The Intimidator will find you. Avoiding him or her probably won't work.
- Don't rely on witnesses
- Most witnesses probably won't have noticed anything inappropriate. Intimidators often fly under the radar.
- Retreat — don't retaliate
- If the Intimidator puts a hand on you, step away, turning as necessary to break contact. Avoid retaliatory touching — it can escalate dangerously.
- If power is involved, get help
- If there is an organizational power differential between you (either way), get help from Human Resources. When you ask for help, have a log of incidents — dates, times, and places.
- Confront in a safe setting
- If you elect to confront, choose a setting in which you feel safe. At a minimum, safety should include guaranteed egress. Tell the toucher directly that the touching must end. Don't threaten, but project earnest seriousness.
Recognize that what drives intimidators is fear. If you can marshal the courage to respond, you'll be delighted with the outcome, and, most likely, you'll wonder why you didn't act sooner. Top Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
- Biological Mimicry and Workplace Bullying
- When targets of bullies decide to stand up to their bullies, to end the harassment, they frequently
act before they're really ready. Here's a metaphor that explains the value of waiting for the right
time to act.
- On Being the Canary
- Nobody else seems to be concerned about what's going on. You are. Should you raise the issue? What are
the risks? What are the risks of not raising the issue?
- Workplace Bullying and Workplace Conflict: II
- Of the tools we use to address toxic conflict, many are ineffective for ending bullying. Here's a review
of some of the tools that don't work well and why.
- Seventeen Guidelines About Workplace Bullying
- Bullying is a complex social pattern. Thinking clearly about bullying is difficult in the moment because
our emotions can distract us. Here are some short insights about bullying that are easy to remember
in the moment.
- Online Ethics
- The array of media for exchanging our thoughts in text has created new opportunities for acting unethically.
Cyberbullying is one well-known example. But sending text is just one way to cross the line ethically.
Here are some examples of alternatives.
See also Workplace Bullying and Workplace Bullying for more related articles.
Forthcoming issues of Point Lookout
- Coming December 11: White Water Rafting as a Metaphor for Group Development
- Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
- And on December 18: Subgrouping and Conway's Law
- When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
- Your stuff is brilliant! Thank you!
- You and Scott Adams both secretly work here, right?
- I really enjoy my weekly newsletters. I appreciate the quick read.
- A sort of Dr. Phil for Management!
- …extremely accurate, inspiring and applicable to day-to-day … invaluable.
- More