We began exploring rapid-fire attacks last time, emphasizing response tactics that depend on assistance from others. But what if there are no others to turn to? What if others decline to assist? Options for targets depend to some extent on the relative organizational power of attacker and target.
When the attacker has superior organizational power, targets have limited options. Some attackers tempt their targets to "lose it" by leading them to exhibit behavior that justifies organizationally sanctioned disciplinary action. Others intentionally inflict emotional pain. Attackers' motives vary, but for targets of powerful attackers, the only "safe" response — short of transfer or voluntary termination — is tolerating the attacks. To limit opportunities for their attackers, targets should avoid private meetings or other settings free of witnesses. And, of course, log everything.
The more interesting case is the attacker who has little organizational power over the target. Perhaps attacker and target are peers, or close to it. In this situation, the target can choose the tolerance strategy described above, but that's unlikely to persuade the attacker to cease.
By creating conditions that can make the attacker's behavior both obvious to management and harmful to management's goals, the three alternative tactics below can help to convince management to intervene.
- In response to verbal criticisms and attacks, targets can request further detail and criticism. Attackers are unlikely to interrupt such validating queries. Some attackers can thus be seduced into making stunningly outrageous claims and demands.
- When the attacker demands additional explanations or records, and assembling that information would consume resources management would rather not expend, the target can agree to comply. If a management representative is present, he or she will feel pressure to intervene on behalf of the target to prevent waste. If management isn't present, the target can later seek approval from management, which can compel management to intervene on behalf of the target. In these cases, targets should make clear that the compilation effort will delay other efforts already scheduled.
- In assembling When the attacker has superior
organizational power, targets
have limited optionsthe requested information, targets can include excruciating detail and other ancillary information, so as to compel the attacker to demand further clarification.
- Plopping is a way of ignoring the attacker. Best used before witnesses, plopping can anger the attacker, which might lead to inappropriate behavior. To execute the tactic, the target pauses when interrupted by the attacker, waits for the attacker to finish, ignores whatever the attacker said, and resumes as if nothing happened. In effect, the attacker's words land with a "plop." While this approach seems superficially to be reasonable behavior, it is nevertheless extraordinarily irritating to the attacker. See "Plopping," Point Lookout for October 22, 2003, for more.
Are you being targeted by a workplace bully? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of
American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just USD 9.99. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenCEMoXnkFSzyGEbSjner@ChacedGiyhDAvDnKBIrToCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- Intimidation Tactics: Touching
- Workplace touching can be friendly, or it can be dangerous and intimidating. When touching is used to
intimidate, it often works, because intimidators know how to select their targets. If you're targeted,
what can you do?
- Looking the Other Way
- Sometimes when we notice wrongdoing, and we aren't directly involved, we don't report it, and we don't
intervene. We look the other way. Typically, we do this to avoid the risks of making a report. But looking
the other way is also risky. What are the risks of looking the other way?
- The Costs of Threats
- Threatening as a way of influencing others might work in the short term. But a pattern of using threats
to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships,
and create an atmosphere of fear.
- How Workplace Bullies Use OODA: II
- Workplace bullies who succeed in carrying on their activities over a long period of time are intuitive
users of Boyd's OODA model. Here's Part II of an exploration of how bullies use the model.
- So You Want the Bullying to End: I
- If you're the target of a workplace bully, you probably want the bullying to end. If you've ever been
the target of a workplace bully, you probably remember wanting it to end. But how it ends can be more
important than whether or when it ends.
Forthcoming issues of Point Lookout
- Coming August 22: Dealing with Credit Appropriation
- Very little is more frustrating than having someone else claim credit for the work you do. Worse, sometimes they blame you if they get into trouble after misusing your results. Here are three tips for dealing with credit appropriation. Available here and by RSS on August 22.
- And on August 29: Please Reassure Them
- When things go wildly wrong, someone is usually designated to investigate and assess the probability of further trouble. That role can be risky. Here are three guidelines for protecting yourself if that role falls to you. Available here and by RSS on August 29.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenlmmrBsfiTPGGqQqDner@ChaczgPONffSYxIsXbmyoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.