It isn't surprising when some pet projects get resources — perhaps their nurturers answer to no one, or they abuse their authority. But some pet projects thrive even when their nurturers lack absolute power and seem to have done nothing wrong. Somehow they've found ways to feed their pets without violating organizational policy — or, at least, not much.
In last week's edition, we examined how nurturers of pet projects can abuse their authority to secure resources. Here are some methods that don't necessarily involve abuse of authority, but do depend on cleverness.
- Legitimate circumvention of policy intent
- Sometimes resources flow to pet projects by secretive redirection. In some cases this involves falsification of records, but sometimes the projects' nurturers have exploited flexibility or openings in organizational policy.
- Since even the most primitive control systems involve several people, this technique usually requires collaboration among several individuals, which is difficult to arrange unless the activity is at least superficially legitimate. It's wise to regard these incidents as indicators of (possibly benign) policy defects.
- Exchange of political favors
- In an I-scratch-your-back-you-scratch-mine exchange, two people with access to resources trade those resources, nurturing each other's pets. On the surface, each resource-owner's contribution is legitimate.
- Detecting this tactic is complicated when the exchange crosses supervisory boundaries, because it requires visibility at organizational levels higher than the supervisor of each party to the exchange. It's wise to regard these incidents as indicators of defects in compliance monitoring.
- Scavenging, surplus and mistakes
- Occasionally, possibly as a result of accounting errors, surplus or idle resources become available to anyone who wants them. For instance, some engineering consulting firms have internal R&D programs intended for development of expertise, but these programs can sometimes be deflected to pet projects.
- In many Surplus or idle resources
sometimes become available
to anyone who wants theminstances, the losses to the organization resulting from deflecting these resources are acceptable. Detecting the deflection might not result in much advantage to the organization. But when internal development programs are a means of implementing important strategic decisions, monitoring the use of their resources to inhibit redirection to pet projects can add significant value to the program.
- Gifts from above
- At times — usually at the nurturer's request — the nurturer's supervisor might bestow a gift of resources on the pet project, knowing that the organization would not support the project to that extent through routine channels.
- Motivations for such gifts can include a desire to assist the career of the subordinate, and a desire to see the pet project progress. Preventing these gifts might not be advisable, because prevention could conflict with the supervisor's appropriate independence.
By whatever means nurturers secure resources for their pets, they do so in contravention of organizational intent. Fortunately, pet projects do sometimes benefit the organization, and perhaps that's one reason why they're here to stay. First in this series Top Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- Things We Believe That Maybe Aren't So True
- Maxims and rules make life simpler by eliminating decisions. And they have a price: they sometimes foreclose
options that would have worked better than anything else. Here are some things we believe in maybe a
little too much.
- Animosity Patterns
- Animosity between two people at work is often attributed to "personality clashes." While sometimes
people can't get along, animosity can also be a tool for accomplishing strictly political ends. Here's
a short catalog of some of its uses.
- Unwanted Hugs from Strangers
- Some of us have roles at work that expose us to unwanted hugs from people we don't know. After a while,
this experience can be far worse than merely annoying. How can we deal with unwanted hugs from strangers?
- On Snitching at Work: II
- Reporting violations of laws, policies, regulations, or ethics to authorities at work can expose you
to the risk of retribution. That's why the reporting decision must consider the need for safety.
- Please Reassure Them
- When things go wildly wrong, someone is usually designated to investigate and assess the probability
of further trouble. That role can be risky. Here are three guidelines for protecting yourself if that
role falls to you.
Forthcoming issues of Point Lookout
- Coming June 26: Appearance Antipatterns: I
- Appearances can be deceiving. Just as we can misinterpret the actions and motivations of others, others can misinterpret our own actions and motivations. But we can take steps to limit these effects. Available here and by RSS on June 26.
- And on July 3: Appearance Antipatterns: II
- When we make decisions based on appearance we risk making errors. We create hostile work environments, disappoint our customers, and create inefficient processes. Maintaining congruence between the appearance and the substance of things can help. Available here and by RSS on July 3.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.