In organizational politics, most attack strategies assume accurate predictions of the defender's response. Since unsophisticated attackers tend to leave options open for defenders, finding suitable defense strategies is relatively straightforward. But sophisticated attackers usually try to gain control of the defender's choices to reduce uncertainty about the outcome. The sophisticated attack is therefore the interesting case.
For sophisticated attacks, unexpected responses are preferable. One response that's often effective is "rope-a-dope." The term was first applied to Mohammed Ali's strategy in a boxing match with then heavyweight champion George Foreman, on October 30, 1974, in Kinshasa. After letting Foreman tire on the attack, Ali won by a knockout in the eighth round.
The strength of "rope-a-dope" is its focus on the long time scale. Foreman was thinking on the time scale of the jab or punch, or at most, several combinations. Ali was thinking on the time scale of several rounds. Ali's strategy was to withstand blows while Foreman exhausted himself, and then switch to offense.
In organizational politics, attackers tend to focus on the same time scale as their attacks. They try to control the defender's immediate response options, emphasizing especially those responses that could harm the attacker and eventually give the defender the initiative.
A rope-a-dope response to political attacks first emphasizes withstanding the attacks long enough to render the attacker incapable of effective defense. Only then does the defender go to the offense.
For example, suppose Hannibal, the attacker and more powerful, is the leader of H-Division. Hannibal seeks to acquire C-Division, headed by Clarice, the defender and less powerful. Hannibal intends to terminate Clarice, and then install policies that decrease sales of C-Division's products, some of which embarrass H-Division because of their superiority.
Defenders usually try to make the most cogent rational case for retaining the status quo. Because logic is less effective than political power, they rarely succeed. For instance, the attacker might have prepared the ground by having pre-positioned persuasive rational arguments — sometimes based on misrepresentations — outside the defender's awareness.
The rope-a-dope response to such an attack has three steps:
- Enhance situational awareness
- Enhance In organizational politics, attackers
tend to focus on the same
time scale as their attacksdetection of the attacker's pre-positioning of rational arguments for acquiring and eventually dismembering the defending organization. Using this knowledge, adjust C-Division's activities, and prepare — but don't deliver — counterclaims and refutations of Hannibal's claims.
- Produce a superior, high-value, high-visibility product
- Produce a product that's based on strong customer relationships, and which cannot be replicated outside C-Division, because it depends on the division's continued existence, intact. This ploy secures organizational longevity, even if H-Division acquires C-Division.
- Seize the initiative
- After the acquisition, when Hannibal's exaggerated claims are beginning to crumble, release the previously crafted refutations and counterclaims.
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Politics:
- The High Cost of Low Trust: II
- Truly paying attention to Trust at work is rare, in part, because we don't fully appreciate what distrust
really costs. Here's Part II of a little catalog of how we cope with distrust, and how we pay for it.
- Why There Are Pet Projects
- Pet projects are common in organizations, including organizations with healthy and mature planning processes.
They usually consume resources at levels beyond what the organization intends, which raises the question
of their genesis: Where do pet projects come from?
- Devious Political Tactics: More from the Field Manual
- Careful observation of workplace politics reveals an assortment of devious tactics that the ruthless
use to gain advantage. Here are some of their techniques, with suggestions for effective responses.
- The Opposite of Influence
- The question of why some people are so influential has a partner question: why are others largely ignored,
or opposed, even when their contributions are valuable?
- Full Disclosure
- The term "full disclosure" is now a fairly common phrase, especially in news interviews and
in film and fiction thrillers involving government employees or attorneys. It also has relevance in
the knowledge workplace, and nuances associated with it can affect your credibility.
Forthcoming issues of Point Lookout
- Coming October 4: Self-Importance and Conversational Narcissism at Work: I
- Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing a narcissist's sense of self-importance. Available here and by RSS on October 4.
- And on October 11: Self-Importance and Conversational Narcissism at Work: II
- Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance. Available here and by RSS on October 11.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.