![Palm trees blowing in a hurricane Palm trees blowing in a hurricane](../images/palms-in-hurricane-2.png)
Palm trees blowing in hurricane-force wind. For some species of palm trees, survivability in hurricane force winds is excellent. Their leaves yield first, as shown in the photo. But the trunks are flexible too, and if the wind is strong enough, it can strip the leaves from the tree, greatly relieving stress on the trunk. For even stronger winds, the tree can topple, but unlike other species, toppling doesn't necessarily kill the tree. You might have seen some palm trees that seem to grow horizontally out of the ground. These trees are usually survivors of toppling.
We can take some valuable lessons from the palm tree. If survival is the goal, flexibility is a must.
Photo courtesy U.S. National Oceanic and Atmospheric Administration.
We began exploring rapid-fire attacks last time, emphasizing response tactics that depend on assistance from others. But what if there are no others to turn to? What if others decline to assist? Options for targets depend to some extent on the relative organizational power of attacker and target.
When the attacker has superior organizational power, targets have limited options. Some attackers tempt their targets to "lose it" by leading them to exhibit behavior that justifies organizationally sanctioned disciplinary action. Others intentionally inflict emotional pain. Attackers' motives vary, but for targets of powerful attackers, the only "safe" response — short of transfer or voluntary termination — is tolerating the attacks. To limit opportunities for their attackers, targets should avoid private meetings or other settings free of witnesses. And, of course, log everything.
The more interesting case is the attacker who has little organizational power over the target. Perhaps attacker and target are peers, or close to it. In this situation, the target can choose the tolerance strategy described above, but that's unlikely to persuade the attacker to cease.
By creating conditions that can make the attacker's behavior both obvious to management and harmful to management's goals, the three alternative tactics below can help to convince management to intervene.
- Reflecting
- In response to verbal criticisms and attacks, targets can request further detail and criticism. Attackers are unlikely to interrupt such validating queries. Some attackers can thus be seduced into making stunningly outrageous claims and demands.
- Complying
- When the attacker demands additional explanations or records, and assembling that information would consume resources management would rather not expend, the target can agree to comply. If a management representative is present, he or she will feel pressure to intervene on behalf of the target to prevent waste. If management isn't present, the target can later seek approval from management, which can compel management to intervene on behalf of the target. In these cases, targets should make clear that the compilation effort will delay other efforts already scheduled.
- In assembling When the attacker has superior
organizational power, targets
have limited optionsthe requested information, targets can include excruciating detail and other ancillary information, so as to compel the attacker to demand further clarification. - Plopping
- Plopping is a way of ignoring the attacker. Best used before witnesses, plopping can anger the attacker, which might lead to inappropriate behavior. To execute the tactic, the target pauses when interrupted by the attacker, waits for the attacker to finish, ignores whatever the attacker said, and resumes as if nothing happened. In effect, the attacker's words land with a "plop." While this approach seems superficially to be reasonable behavior, it is nevertheless extraordinarily irritating to the attacker. See "Plopping," Point Lookout for October 22, 2003, for more.
Management intervention is of course preferable. But one of these tactics might be the best available choice to induce management to do its duty. First issue in this series
Top
Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
Workplace Bullying and Workplace Conflict: II
- Of the tools we use to address toxic conflict, many are ineffective for ending bullying. Here's a review
of some of the tools that don't work well and why.
Rapid-Fire Attacks
- Someone asks you a question. Within seconds of starting to reply, you're hit with another question,
or a rejection of your reply. Abusively. The pattern repeats. And repeats again. And again. You're being
attacked. What can you do?
Strategies of Verbal Abusers
- Verbal abuse at work has special properties, because it takes place in an environment in which verbal
abuse is supposedly proscribed. Yet verbal abuse does happen at work. Here are three strategies abusers
rely on to avoid disciplinary action.
Unrecognized Bullying: I
- Much workplace bullying goes unrecognized. Three reasons: (a) conventional definitions of bullying exclude
much actual bullying; (b) perpetrators cleverly evade detection; and (c) cognitive biases skew our perceptions
so we don't see some bullying as bullying.
Unrecognized Bullying: III
- Much workplace bullying goes unrecognized because of cognitive biases that can cause targets, perpetrators,
bystanders, and supervisors of perpetrators not to notice bullying. The Halo Effect and the Horn Effect
are two of these biases.
See also Workplace Bullying and Conflict Management for more related articles.
Forthcoming issues of Point Lookout
Coming July 3: Additive bias…or Not: II
- Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.
And on July 10: On Delegating Accountability: I
- As the saying goes, "You can't delegate your own accountability." Despite wide knowledge of this aphorism, people try it from time to time, especially when overcome by the temptation of a high-risk decision. What can you delegate, and how can you do it? Available here and by RSS on July 10.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
![Send email or subscribe to one of my newsletters](../images/social-icons/email-32.png)
![Follow me at LinkedIn](../images/social-icons/linkedin-reg-32.png)
![Follow me at X, or share a post](../images/social-icons/x-32.png)
![Subscribe to RSS feeds](../images/social-icons/feed-icon-32.png)
![Subscribe to RSS feeds](../images/social-icons/facebook-icon-32.png)
Recommend this issue to a friend
Send an email message to a friend
rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
![Technical Debt for Policymakers Blog](../images/logos/techdebtpolicy-logo-sm-1.png)