When we waste time with email because of our own actions, complaining bitterly about it doesn't make much sense. To get control of email, we have to change how we work with it. Here's Part IV of a little catalog of ways to waste time with email. See "Email Antics: III," Point Lookout for January 14, 2004, for more.
- Gossip about people in a message, then accidentally send it to them, too
- Gossiping in email is dangerous. Even if you don't accidentally send the gossip to the wrong people, someone else can, at any time. It's called the "Forward" button.
- Assume that the sender is the actual sender
- Most often, the From does contain the actual sender's name and address. But there are viruses, spammers, and others in the world who know how to "spoof" the From, with malice in mind. Before you launch a tirade, consider whether the person in the From really is the sender.
- Age your inbox
- Aging a message in your inbox before answering might be OK, but would you like one of your urgent queries to be treated that way? Your delaying might be a serious inconvenience to your correspondent. If you really are so busy that you can't reply fully, send a short note explaining the delay and estimating when you can respond.
- Print a message before reading
- Unless you Humor is culture-specific,
and often personal.
Tag your humor somehow.have a health reason for printing before reading, get used to the twenty-first century. Learn to read directly from your display. If your display is hard to read, change the default font and colors to something you like better. After you've read the message, you can print it if it's important enough. Most of the truly important messages still come to you on paper anyway.
- Forget that humor is cultural — even microcultural
- Humor is culture-specific, and often personal. That's why we so often disagree about what (or who) is funny. Assume that some people won't understand your humor, or worse, that they'll understand it but don't think it's funny. Tag your humor somehow — smileys work pretty well. Seriously. ;^)
- Use sarcasm
- Sarcasm is usually obvious in live conversation, when we can use voice tone, body language, and facial expressions to signal the sarcasm. In email, sarcasm is dangerous, because the tone of the voice in your head as you write isn't attached to the message. The consequences of misunderstanding can be truly horrible. If you must use sarcasm, indicate it in some explicit way, such as: <Begin sarcasm>attaching to the message a drawing of a hammer that recipients can use to hit themselves over the head until they get it<End sarcasm>.
If you do some of these, and you'd like to stop, tack this list on your wall. Highlight the ones you want to avoid, and review it once in a while to see how you're doing. Be patient, expect lapses, and celebrate your victories. First in this series Top Next Issue
Are you so buried in email that you don't even have time to delete your spam? Do you miss important messages? So many of the problems we have with email are actually within our power to solve, if we just realize the consequences of our own actions. Read 101 Tips for Writing and Managing Email to learn how to make peace with your inbox. Order Now!
And if you have organizational responsibility, you can help transform the culture to make more effective use of email. You can reduce volume while you make content more valuable. You can discourage email flame wars and that blizzard of useless if well-intended messages from colleagues and subordinates. Read Where There's Smoke There's Email to learn how to make email more productive at the organizational scale — and less dangerous. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Communication at Work:
- Nasty Questions: I
- Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather,
they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's
political agenda. Here's part one a catalog of some favorite tactics.
- Long-Loop Conversations: Anticipation
- In virtual or global teams, conversations are sources of risk to the collaboration. Because the closed-loop
response time for exchanges can be a day or more, long-loop conversations generate misunderstanding,
toxic conflict, errors, delays, and rework. One strategy for controlling these phenomena is anticipation.
- Start the Meeting with a Check-In
- Check-ins give meeting attendees a chance to express satisfaction or surface concerns about how things
are going. They're a valuable aid to groups that want to stay on course, or get back on course when needed.
- Anticipate Counter-Communication
- Effective communication enables two parties to collaborate. Counter-communication is information provided
by a third party that contradicts the basis of agreements or undermines that collaboration.
- Interrupting Others in Meetings Safely: II
- When we feel the need to interrupt someone who's speaking in a meeting, to offer a view or information,
we would do well to consider (and mitigate) the risk of giving offense. Here are some techniques for
interrupting the speaker in situations not addressed by the meeting's formal process.
Forthcoming issues of Point Lookout
- Coming January 29: Higher-Velocity Problem Definition
- Typical approaches to shortening time-to-market for new products usually involve accelerating problem solving. Accelerating problem definition can also help. Available here and by RSS on January 29.
- And on February 5: Unrecognized Bullying: I
- Much workplace bullying goes unrecognized. Three reasons: (a) conventional definitions of bullying exclude much actual bullying; (b) perpetrators cleverly evade detection; and (c) cognitive biases skew our perceptions so we don't see bullying as bullying. Available here and by RSS on February 5.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.