Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 5, Issue 44;   November 2, 2005: The Costs of Threats

The Costs of Threats

by

Threatening as a way of influencing others might work in the short term. But a pattern of using threats to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships, and create an atmosphere of fear.

As the meeting continued, and her task list grew, Ellie got anxious. Making any changes so close to the demonstration was risky at best. But the number and complexity of these changes meant that she would be working long hours under pressure. So she spoke up. "I'm getting a little worried," she began. "This is a lot of work, and it has to be done right or we could be in trouble."

Threatened and fearfulWarner didn't miss a beat. "We'll be in bigger trouble if it doesn't get done."

Threatening was one of Warner's favorite tactics, and Ellie had had enough. So she called him on it. "Oh? What kind of trouble?"

Warner escalated. "Do you like having a job?"

Ellie and Warner were now officially in a tangle — one of the many serious consequences of using threats as a tool of influence. Their relationship had been in tatters for a while, in part because of Warner's persistent use of threats.

People use threats
because threats seem to
be extremely cheap
People use threats because threats seem to be extremely cheap, if they work. Threats can achieve quick results for very little effort. All you have to do is deliver the threat. But the real costs are high, and they're often invisible to those who threaten.

Eroded credibility
To maintain the credibility of the threat tactic, occasional demonstrations are necessary. But since the goal of most threateners is influence or compliance, and since the threatened typically do comply, opportunities to carry out personal threats are rare. Over time, the threatener's credibility inevitably erodes.
Damaged relationships
Threats erode our sense of safety. They reduce our willingness to disclose anything that might add to our sense of fear. These conditions lead to distrust and speculation, and they make healthy relationships difficult.
Feelings of resentment
When threats are personal, as Ellie experienced with Warren, they can lead to resentment and an I'll-show-them attitude. For instance, the threatened might engage in conspiracies of silence or even of action. Those less comfortable with overtly destructive acts might choose passively destructive acts, such as withholding information about problems for which they aren't directly responsible.
Decline in motivation and creativity
People who feel threatened might begin to husband their output, reserving it for use when they need to respond to the next threat. Certainly the atmosphere on the job becomes unpleasant, and the thrills become hard to find. The threatened often adopt a get-through-the-day attitude.

If you're subjected to threats at work, and you notice the effects on your level of joy, do what you can to lift yourself above it. Recognize the emptiness of the threatener's toolkit, and resolve to find a different way to influence people yourself.

If you use threats now and then, I hope you'll look for alternatives. Or else. Go to top Top  Next issue: Empire Building  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

One form of threat people feel comfortable using is the indirect threat. The comfort comes from the ambiguity of the threat; if "caught," the threatener can claim, "Oh, I didn't mean that." Despite the indirectness, the threat is still destructive. For more on indirectness, see "The True Costs of Indirectness," Point Lookout for November 29, 2006.

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

A straw-bale houseResponding to Threats: I
Threats are one form of communication common to many organizational cultures, especially as pressure mounts. Understanding the varieties of threats can be helpful in determining a response that fits for you.
Small cage with canary used in testing for carbon monoxide after the Hollinger Mine fire on February 10, 1928On Being the Canary
Nobody else seems to be concerned about what's going on. You are. Should you raise the issue? What are the risks? What are the risks of not raising the issue?
A U.S. Marine sniper wearing sniper camouflage gear known as a "ghillie" suitHow Targets of Bullies Can Use OODA: II
To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not sufficient — someone must make the bully stop. That's why counterattack is much more likely to work.
Two bull elk sparring in Grand Teton National Park, WyomingWorkplace Bullying and Workplace Conflict: I
Bullying is unlike other forms of toxic conflict. That's why the tools we use to address toxic conflict simply do not work for bullying. In this Part I, we contrast bullying and ordinary toxic conflict.
Three gulls excluding a fourthUnrecognized Bullying: I
Much workplace bullying goes unrecognized. Three reasons: (a) conventional definitions of bullying exclude much actual bullying; (b) perpetrators cleverly evade detection; and (c) cognitive biases skew our perceptions so we don't see some bullying as bullying.

See also Workplace Bullying and Workplace Bullying for more related articles.

Forthcoming issues of Point Lookout

A white water rafting team completes its courseComing December 11: White Water Rafting as a Metaphor for Group Development
Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
Tuckman's stages of group developmentAnd on December 18: Subgrouping and Conway's Law
When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.