It isn't surprising when some pet projects get resources — perhaps their nurturers answer to no one, or they abuse their authority. But some pet projects thrive even when their nurturers lack absolute power and seem to have done nothing wrong. Somehow they've found ways to feed their pets without violating organizational policy — or, at least, not much.
In last week's edition, we examined how nurturers of pet projects can abuse their authority to secure resources. Here are some methods that don't necessarily involve abuse of authority, but do depend on cleverness.
- Legitimate circumvention of policy intent
- Sometimes resources flow to pet projects by secretive redirection. In some cases this involves falsification of records, but sometimes the projects' nurturers have exploited flexibility or openings in organizational policy.
- Since even the most primitive control systems involve several people, this technique usually requires collaboration among several individuals, which is difficult to arrange unless the activity is at least superficially legitimate. It's wise to regard these incidents as indicators of (possibly benign) policy defects.
- Exchange of political favors
- In an I-scratch-your-back-you-scratch-mine exchange, two people with access to resources trade those resources, nurturing each other's pets. On the surface, each resource-owner's contribution is legitimate.
- Detecting this tactic is complicated when the exchange crosses supervisory boundaries, because it requires visibility at organizational levels higher than the supervisor of each party to the exchange. It's wise to regard these incidents as indicators of defects in compliance monitoring.
- Scavenging, surplus and mistakes
- Occasionally, possibly as a result of accounting errors, surplus or idle resources become available to anyone who wants them. For instance, some engineering consulting firms have internal R&D programs intended for development of expertise, but these programs can sometimes be deflected to pet projects.
- In many Surplus or idle resources
sometimes become available
to anyone who wants theminstances, the losses to the organization resulting from deflecting these resources are acceptable. Detecting the deflection might not result in much advantage to the organization. But when internal development programs are a means of implementing important strategic decisions, monitoring the use of their resources to inhibit redirection to pet projects can add significant value to the program.
- Gifts from above
- At times — usually at the nurturer's request — the nurturer's supervisor might bestow a gift of resources on the pet project, knowing that the organization would not support the project to that extent through routine channels.
- Motivations for such gifts can include a desire to assist the career of the subordinate, and a desire to see the pet project progress. Preventing these gifts might not be advisable, because prevention could conflict with the supervisor's appropriate independence.
By whatever means nurturers secure resources for their pets, they do so in contravention of organizational intent. Fortunately, pet projects do sometimes benefit the organization, and perhaps that's one reason why they're here to stay. First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenQTAOPcggAGyNgWMsner@ChacakpYdBzBCBUQizdhoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- Stonewalling: I
- Stonewalling is a tactic of obstruction used by those who wish to stall the forward progress of some
effort. Whether the effort is a rival project, an investigation, or just the work of a colleague, the
stonewaller hopes to gain advantage. What can you do about stonewalling?
- Extrasensory Deception: II
- In negotiating agreements, the partners who do the drafting have an ethical obligation not to exploit
the advantages of the drafting role. Some drafters don't meet that standard.
- Political Framing: Strategies
- In organizational politics, one class of toxic tactics is framing — accusing a group or individual
by offering interpretations of their actions to knowingly and falsely make them seem responsible for
reprehensible or negligent acts. Here are some strategies framers use.
- The Power of Situational Momentum
- For many of us, the typical workday presents a series of opportunities to take action. We often approach
these situations by choosing among the expected choices. But usually there are choices that exploit
situational momentum, and they can be powerful choices indeed.
- Power, Authority, and Influence: A Systems View
- Power, Authority, and Influence are often understood as personal attributes. To fully grasp how they
function in organizations, we must adopt a systems view.
Forthcoming issues of Point Lookout
- Coming February 27: Brainstorming and Speedstorming: II
- Recent research into the effectiveness of brainstorming has raised some questions. Motivated to examine alternatives, I ran into speedstorming. Here's Part II of an exploration of the properties of speedstorming. Available here and by RSS on February 27.
- And on March 6: A Pain Scale for Meetings
- Most meetings could be shorter, less frequent, and more productive than they are. Part of the problem is that we don't realize how much we do to get in our own way. If we track the incidents of dysfunctional activity, we can use the data to spot trends and take corrective action. Available here and by RSS on March 6.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbreniaQedGrzGctoDJhJner@ChacxMqCbaOfXtVHBWuEoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.