It isn't surprising when some pet projects get resources — perhaps their nurturers answer to no one, or they abuse their authority. But some pet projects thrive even when their nurturers lack absolute power and seem to have done nothing wrong. Somehow they've found ways to feed their pets without violating organizational policy — or, at least, not much.
In last week's edition, we examined how nurturers of pet projects can abuse their authority to secure resources. Here are some methods that don't necessarily involve abuse of authority, but do depend on cleverness.
- Legitimate circumvention of policy intent
- Sometimes resources flow to pet projects by secretive redirection. In some cases this involves falsification of records, but sometimes the projects' nurturers have exploited flexibility or openings in organizational policy.
- Since even the most primitive control systems involve several people, this technique usually requires collaboration among several individuals, which is difficult to arrange unless the activity is at least superficially legitimate. It's wise to regard these incidents as indicators of (possibly benign) policy defects.
- Exchange of political favors
- In an I-scratch-your-back-you-scratch-mine exchange, two people with access to resources trade those resources, nurturing each other's pets. On the surface, each resource-owner's contribution is legitimate.
- Detecting this tactic is complicated when the exchange crosses supervisory boundaries, because it requires visibility at organizational levels higher than the supervisor of each party to the exchange. It's wise to regard these incidents as indicators of defects in compliance monitoring.
- Scavenging, surplus and mistakes
- Occasionally, possibly as a result of accounting errors, surplus or idle resources become available to anyone who wants them. For instance, some engineering consulting firms have internal R&D programs intended for development of expertise, but these programs can sometimes be deflected to pet projects.
- In many Surplus or idle resources
sometimes become available
to anyone who wants theminstances, the losses to the organization resulting from deflecting these resources are acceptable. Detecting the deflection might not result in much advantage to the organization. But when internal development programs are a means of implementing important strategic decisions, monitoring the use of their resources to inhibit redirection to pet projects can add significant value to the program.
- Gifts from above
- At times — usually at the nurturer's request — the nurturer's supervisor might bestow a gift of resources on the pet project, knowing that the organization would not support the project to that extent through routine channels.
- Motivations for such gifts can include a desire to assist the career of the subordinate, and a desire to see the pet project progress. Preventing these gifts might not be advisable, because prevention could conflict with the supervisor's appropriate independence.
By whatever means nurturers secure resources for their pets, they do so in contravention of organizational intent. Fortunately, pet projects do sometimes benefit the organization, and perhaps that's one reason why they're here to stay. First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenrDUDwWaUxOAJtKFRner@ChaclWPJpPZohNvtYLEJoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- Managing Risk Revision
- Prudent risk management begins by accepting the possibility that unpleasant events might actually happen.
But when organizations try to achieve goals that are a bit out of reach, they're often tempted to stretch
resources by revising or denying risks. Here's a tactic for managing risk revision.
- No Tangles
- When we must say "no" to people who have superior organizational power, the message sometimes
fails to get across. The trouble can be in the form of the message, the style of delivery, or elsewhere.
How does this happen?
- Conversation Despots
- Some people insist that conversations reach their personally favored conclusions, no matter what others
want. Here are some of their tactics.
- Unanswerable Questions
- Some questions are beyond our power to answer, but many of us try anyway. What are some of these unanswerable
questions and how can we respond?
- Congruent Decision-Making: I
- Decision-makers who rely on incomplete or biased information are more likely to make faulty decisions.
Congruent decision-making can limit the incidence of bad decisions.
Forthcoming issues of Point Lookout
- Coming December 11: The Rhyme-as-Reason Effect
- When we speak or write, the phrases we use have both form and meaning. Although we usually think of form and meaning as distinct, we tend to assess as more meaningful and valid those phrases that are more beautifully formed. The rhyme-as-reason effect causes us to confuse the validity of a phrase with its aesthetics. Available here and by RSS on December 11.
- And on December 18: The Trap of Beautiful Language
- As we assess the validity of others' statements, we risk making a characteristically human error — we confuse the beauty of their language with the reliability of its meaning. We're easily thrown off by alliteration, anaphora, epistrophe, and chiasmus. Available here and by RSS on December 18.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenrDUDwWaUxOAJtKFRner@ChaclWPJpPZohNvtYLEJoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.