The rapid-fire attack, often executed before witnesses or within earshot of witnesses, can be unbearable. Defending against it can be even more difficult. But targets who understand the dynamics that make these attacks so hurtful can respond effectively. And that can be very satisfying.
The OODA model of conflict can help us understand the power of the rapid-fire attack. (See "OODA at Work," Point Lookout for April 6, 2011) According to OODA, when we're engaged in conflict, we cycle through a loop of Observing, Orienting, Deciding, and Acting. If the attacks arrive more rapidly than the target can cycle through his or her OODA loop, the attacker can eventually prevail. Unable to keep up with the attacks, some targets feel so overloaded and frustrated that clear thinking itself becomes impossible.
When this happens, how can targets respond? Let's first explore some responses that are usually ineffective.
- File complaints
- Targets can complain to the attacker's supervisor, to their own supervisors, or to the Human Resources department.
- Most likely, if a pattern is in place, a competent supervisor — the target's or the attacker's — would have already noticed the pattern. The supervisor hasn't acted effectively, and probably won't or can't. Still, complaining to supervisors might be worthwhile. It's a matter of judgment.
- Filing complaints with Human Resources might work, especially if the organization has a workplace bullying policy. (See "What Is Workplace Bullying?," Point Lookout for March 3, 2010, for more) But what ensues will be beyond the target's control. For example, the investigation will probably involve interviews of all concerned. If any of those interviewed experience these interviews as attacks instigated by the target, retribution could follow.
- Build alliances
- Sometimes, targets try to assemble alliances of witnesses and other targets, before filing a joint complaint. This approach can work, but there are risks. First, alliance members might not preserve confidentiality. If any of them circulates information about the alliance before the alliance takes action, the attacker can disable the alliance before it can act.
- More important, the person who initiates the alliance might be seen by Management as a "troublemaker." Almost certainly, the attacker will attempt to characterize the alliance initiator as such. If that characterization sticks, the initiator has a new problem, far more serious than the attacker's attacks.
- Wait for the attacks to pass
- Waiting can work, Filing complaints with Human Resources
might work, especially if the
organization has a workplace
bullying policybut targets must maintain an unfailingly cool demeanor, because the attacks will persist, and they might even escalate. As they escalate, they become more obvious to all, and the attacker acquires a well-deserved reputation.
- If the target remains cool, never showing aggression, the attacks will seem to be unprovoked, which could force Management to act. But a single break in discipline by the target can make the attacks seem provoked, reducing the likelihood of Management intervening on behalf of the target.
Are you being targeted by a workplace bully? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just USD 9.99. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- Workplace Bullying and Workplace Conflict: I
- Bullying is unlike other forms of toxic conflict. That's why the tools we use to address toxic conflict
simply do not work for bullying. In this Part I, we contrast bullying and ordinary toxic conflict.
- When the Chair Is a Bully: I
- Most meetings have chairs or "leads." Although the expression that the chair "owns"
the meeting is usually innocent shorthand, some chairs actually believe that they own the meeting. This
view is almost entirely destructive. What are the consequences of this attitude, and what can we do about it?
- Dealing with Rapid-Fire Attacks
- When a questioner repeatedly attacks someone within seconds of their starting to reply, complaining
to management about a pattern of abuse can work — if management understands abuse, and if management
wants deal with it. What if management is no help?
- See No Bully, Hear No Bully
- Supervisors of bullies sometimes are unaware of bullying activity in their organizations. Here's a collection
of indicators for supervisors who suspect bullying but who haven't witnessed it directly.
- Social Isolation and Workplace Bullying
- Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why
do bullies use it? What can targets do about it?
Forthcoming issues of Point Lookout
- Coming June 26: Appearance Antipatterns: I
- Appearances can be deceiving. Just as we can misinterpret the actions and motivations of others, others can misinterpret our own actions and motivations. But we can take steps to limit these effects. Available here and by RSS on June 26.
- And on July 3: Appearance Antipatterns: II
- When we make decisions based on appearance we risk making errors. We create hostile work environments, disappoint our customers, and create inefficient processes. Maintaining congruence between the appearance and the substance of things can help. Available here and by RSS on July 3.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.