
A mixed stand of aspen and pine in the Okanagan region of British Columbia and Washington state. Aspen and pine often compete for territory. In some instances, aspen's success seems to be at least partially attributable to its clonal nature (See Chris J. Peterson and Edwin R. Squiers, "Competition and succession in an aspen-white-pine forest," Journal of Ecology 1995, 83, 449-457). That is, aspen groves often consist of a single plant with many shoots resembling individual trees, supported by a massive underground root system. At sites where the aspen's success in competing with pine seems to be related to the clonal nature of the plant, it is possible that the aspen is exploiting shared information across its biomass, which could give it a competitive advantage against pines, because pines, being individuals, probably act less collaboratively. If this is the case, OODA might provide insight into the success of the aspen against its competitor pine. Photo by Clay Antieau courtesy The Washington Biodiversity Council.
How do workplace bullies escape prosecution for as long as they do? Why do their targets tolerate ill treatment for as long as they do? Why do bystanders look the other way as consistently as they do? While most bullies do intimidate nearly everyone around them, that alone doesn't provide satisfactory answers to these questions.
A more satisfactory explanation is that workplace bullies shape their environments to enable continuation of their activities with a minimum of interference. The OODA model, due to US Air Force Col. John Boyd, is a useful tool for understanding how bullies shape their environments. See "OODA at Work," Point Lookout for April 6, 2011, for a summary of the model.
Here is Part I of a small catalog of the ways workplace bullies use the OODA model.
- Intuition
- Most bullies engage in bullying out of compulsion. Although they do plan and they do consciously formulate their attack strategies, they generally don't study bullying scientifically, and they are thus unaware of models like the OODA loop.
- Their understanding of OODA is thus intuitive. Since intuition is founded on experience and observation, the bully's use of OODA is usually limited to what the bully has experienced or seen.
- Targets can exploit this limitation by devising responses to bullying that would require their bullies to use OODA in ways their bullies are unlikely to have seen or experienced. See, for example, "Biological Mimicry and Workplace Bullying," Point Lookout for March 31, 2010.
- Selecting targets
- Bullies tend Since intuition is founded on
experience and observation, the
bully's use of OODA is usually
limited to what the bully has
experienced or seento select targets who, in their estimation, will not effectively resist the bullying. For example, bullies often regard someone who has a limited network of close associates as less likely to be able to mount effective resistance. That's one reason why bullies favor targets who are isolated from, withdrawn from, or different from the group as a whole. Since members of minorities tend to associate most closely with other members of their minority group, they're more likely to have limited networks, and thus make tempting targets for bullies. - Here are two examples illustrating the importance of limited networks of close associates. Observation is the first element of the OODA Loop. Since a limited network reduces the ability of the prospective target to acquire information about the bully's activities, people with limited networks are less able to observe their situations, and thus less able to respond effectively. Action is the fourth element of the OODA Loop. Limited personal networks also reduce the ability of prospective targets to act in their own defense, because, for example, they have less ability to secure testimony in support of allegations against their bullies.
- Prospective targets can reduce their attractiveness to bullies by expanding their networks of close associates.
In Part II, we'll examine how and why workplace bullies try to control the tempo of their activities, and how they approach the more general shaping of their environments. Next issue in this series
Top
Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
More about OODA
What Is Workplace Bullying? [March 3, 2010]
- We're gradually becoming aware that workplace bullying is a significant deviant pattern in workplace relationships. To deal effectively with it, we must know how to recognize it. Here's a start.
Biological Mimicry and Workplace Bullying [March 31, 2010]
- When targets of bullies decide to stand up to their bullies, to end the harassment, they frequently act before they're really ready. Here's a metaphor that explains the value of waiting for the right time to act.
OODA at Work [April 6, 2011]
- OODA is a model of decision making that's especially useful in rapidly evolving environments, such as combat, marketing, politics, and emergency management. Here's a brief overview.
How Workplace Bullies Use OODA: II [April 20, 2011]
- Workplace bullies who succeed in carrying on their activities over a long period of time are intuitive users of Boyd's OODA model. Here's Part II of an exploration of how bullies use the model.
How Targets of Bullies Can Use OODA: I [April 27, 2011]
- Most targets of bullies just want the bullying to stop, but most bullies don't stop unless they fear for their own welfare if they continue the bullying. To end the bullying, targets must turn the tables.
How Targets of Bullies Can Use OODA: II [May 4, 2011]
- To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not sufficient — someone must make the bully stop. That's why counterattack is much more likely to work.
Rapid-Fire Attacks [August 1, 2012]
- Someone asks you a question. Within seconds of starting to reply, you're hit with another question, or a rejection of your reply. Abusively. The pattern repeats. And repeats again. And again. You're being attacked. What can you do?
Projects as Proxy Targets: I [December 18, 2013]
- Some projects have detractors so determined to prevent project success that there's very little they won't do to create conditions for failure. Here's Part I of a catalog of tactics they use.
Joint Leadership Teams: OODA [December 28, 2022]
- Some teams, business units, or enterprises are led not by individuals, but by joint leadership teams of two or more. They face special risks that arise from the organizations that host them, from the team they lead, or from within the joint leadership team itself.
Your comments are welcome
Would you like to see your comments posted here? rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
How Targets of Bullies Can Use OODA: II
- To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not
sufficient — someone must make the bully stop. That's why counterattack is much more
likely to work.
Social Isolation and Workplace Bullying
- Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why
do bullies use it? What can targets do about it?
Manipulators Beware
- When manipulators try to manipulate others, they're attempting to unscrupulously influence their targets
to decide or act in some way the manipulators prefer. But some targets manage to outwit their manipulators.
Even "Isolated Incidents" Can Be Bullying
- Many organizations have anti-bullying policies that address only repeated patterns of interpersonal
aggression. Such definitions expose the organization and its people to the harmful effects of "isolated
incidents" of interpersonal aggression, because even isolated incidents can be bullying.
Unrecognized Bullying: III
- Much workplace bullying goes unrecognized because of cognitive biases that can cause targets, perpetrators,
bystanders, and supervisors of perpetrators not to notice bullying. The Halo Effect and the Horn Effect
are two of these biases.
See also Workplace Bullying for more related articles.
Forthcoming issues of Point Lookout
Coming June 25: Meandering Monologues in Meetings: Engagement
- In a meeting, a meandering monologue has taken over when someone speaks at length with no sign of coming to a clear point, and little of evident value. This behavior reduces engagement on the part of other attendees, thereby limiting the meeting's value to the organization. Available here and by RSS on June 25.
And on July 2: The True Costs of Contractors
- Among the more commonly cited reasons for hiring contractors instead of direct employees is cost savings. But are these savings real? Direct compensation, including perks and benefits, might favor the contractor arrangement, but indirect costs tell another story. Available here and by RSS on July 2.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
Recommend this issue to a friend
Send an email message to a friend
rbrenaXXxGCwVgbgLZDuRner@ChacDjdMAATPdDNJnrSwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed


Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.
- Wikipedia has a nice article with a list of additional resources
- Some public libraries offer collections. Here's an example from Saskatoon.
- Check my own links collection
- LinkedIn's Office Politics discussion group