Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 44;   November 2, 2005: The Costs of Threats

The Costs of Threats

by

Threatening as a way of influencing others might work in the short term. But a pattern of using threats to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships, and create an atmosphere of fear.

As the meeting continued, and her task list grew, Ellie got anxious. Making any changes so close to the demonstration was risky at best. But the number and complexity of these changes meant that she would be working long hours under pressure. So she spoke up. "I'm getting a little worried," she began. "This is a lot of work, and it has to be done right or we could be in trouble."

Threatened and fearfulWarner didn't miss a beat. "We'll be in bigger trouble if it doesn't get done."

Threatening was one of Warner's favorite tactics, and Ellie had had enough. So she called him on it. "Oh? What kind of trouble?"

Warner escalated. "Do you like having a job?"

Ellie and Warner were now officially in a tangle — one of the many serious consequences of using threats as a tool of influence. Their relationship had been in tatters for a while, in part because of Warner's persistent use of threats.

People use threats
because threats seem to
be extremely cheap
People use threats because threats seem to be extremely cheap, if they work. Threats can achieve quick results for very little effort. All you have to do is deliver the threat. But the real costs are high, and they're often invisible to those who threaten.

Eroded credibility
To maintain the credibility of the threat tactic, occasional demonstrations are necessary. But since the goal of most threateners is influence or compliance, and since the threatened typically do comply, opportunities to carry out personal threats are rare. Over time, the threatener's credibility inevitably erodes.
Damaged relationships
Threats erode our sense of safety. They reduce our willingness to disclose anything that might add to our sense of fear. These conditions lead to distrust and speculation, and they make healthy relationships difficult.
Feelings of resentment
When threats are personal, as Ellie experienced with Warren, they can lead to resentment and an I'll-show-them attitude. For instance, the threatened might engage in conspiracies of silence or even of action. Those less comfortable with overtly destructive acts might choose passively destructive acts, such as withholding information about problems for which they aren't directly responsible.
Decline in motivation and creativity
People who feel threatened might begin to husband their output, reserving it for use when they need to respond to the next threat. Certainly the atmosphere on the job becomes unpleasant, and the thrills become hard to find. The threatened often adopt a get-through-the-day attitude.

If you're subjected to threats at work, and you notice the effects on your level of joy, do what you can to lift yourself above it. Recognize the emptiness of the threatener's toolkit, and resolve to find a different way to influence people yourself.

If you use threats now and then, I hope you'll look for alternatives. Or else. Go to top Top  Next issue: Empire Building  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

One form of threat people feel comfortable using is the indirect threat. The comfort comes from the ambiguity of the threat; if "caught," the threatener can claim, "Oh, I didn't mean that." Despite the indirectness, the threat is still destructive. For more on indirectness, see "The True Costs of Indirectness," Point Lookout for November 29, 2006.

Your comments are welcome

Would you like to see your comments posted here? rbrenSOHfqOrWyZOlmVFNner@ChacsZKUxCYDrdEGDIYAoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

A straw-bale houseResponding to Threats: I
Threats are one form of communication common to many organizational cultures, especially as pressure mounts. Understanding the varieties of threats can be helpful in determining a response that fits for you.
A polar bear, feeding, on landResponding to Threats: III
Workplace threats come in a variety of flavors. One class of threats is indirect. Threateners who use the indirect threats aim to evoke fear of consequences brought about not by the threatener, but by other parties. Indirect threats are indeed warnings, but not in the way you might think.
Congessman Darryl Issa (R-CA)When the Chair Is a Bully: II
Assertiveness by chairs of meetings isn't a problem in itself, but it becomes problematic when the chair's dominance deprives the meeting of contributions from some of its members. Here's Part II of our exploration of the problem of bully chairs.
Gen. Robert E. Lee's traveling chess setSo You Want the Bullying to End: II
If you're the target of a workplace bully, ending the bullying can be an elusive goal. Here are some guidelines for tactics to bring it to a close.
September 11, 2001 attacks in New York CityLook Where You Aren't Looking
Being blindsided by an adverse event could indicate the event's sudden, unexpected development. It can also indicate a failure to anticipate what could have been reasonably anticipated. How can we improve our ability to prepare for adverse events?

See also Workplace Bullying and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

The Jolly RogerComing August 22: Dealing with Credit Appropriation
Very little is more frustrating than having someone else claim credit for the work you do. Worse, sometimes they blame you if they get into trouble after misusing your results. Here are three tips for dealing with credit appropriation. Available here and by RSS on August 22.
RMS Titanic departing Southampton on April 10, 1912And on August 29: Please Reassure Them
When things go wildly wrong, someone is usually designated to investigate and assess the probability of further trouble. That role can be risky. Here are three guidelines for protecting yourself if that role falls to you. Available here and by RSS on August 29.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenDFMRnpksqIFYXgYQner@ChacgBMYXXGMvwzADyvfoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.