We began exploring rapid-fire attacks last time, emphasizing response tactics that depend on assistance from others. But what if there are no others to turn to? What if others decline to assist? Options for targets depend to some extent on the relative organizational power of attacker and target.
When the attacker has superior organizational power, targets have limited options. Some attackers tempt their targets to "lose it" by leading them to exhibit behavior that justifies organizationally sanctioned disciplinary action. Others intentionally inflict emotional pain. Attackers' motives vary, but for targets of powerful attackers, the only "safe" response — short of transfer or voluntary termination — is tolerating the attacks. To limit opportunities for their attackers, targets should avoid private meetings or other settings free of witnesses. And, of course, log everything.
The more interesting case is the attacker who has little organizational power over the target. Perhaps attacker and target are peers, or close to it. In this situation, the target can choose the tolerance strategy described above, but that's unlikely to persuade the attacker to cease.
By creating conditions that can make the attacker's behavior both obvious to management and harmful to management's goals, the three alternative tactics below can help to convince management to intervene.
- In response to verbal criticisms and attacks, targets can request further detail and criticism. Attackers are unlikely to interrupt such validating queries. Some attackers can thus be seduced into making stunningly outrageous claims and demands.
- When the attacker demands additional explanations or records, and assembling that information would consume resources management would rather not expend, the target can agree to comply. If a management representative is present, he or she will feel pressure to intervene on behalf of the target to prevent waste. If management isn't present, the target can later seek approval from management, which can compel management to intervene on behalf of the target. In these cases, targets should make clear that the compilation effort will delay other efforts already scheduled.
- In assembling When the attacker has superior
organizational power, targets
have limited optionsthe requested information, targets can include excruciating detail and other ancillary information, so as to compel the attacker to demand further clarification.
- Plopping is a way of ignoring the attacker. Best used before witnesses, plopping can anger the attacker, which might lead to inappropriate behavior. To execute the tactic, the target pauses when interrupted by the attacker, waits for the attacker to finish, ignores whatever the attacker said, and resumes as if nothing happened. In effect, the attacker's words land with a "plop." While this approach seems superficially to be reasonable behavior, it is nevertheless extraordinarily irritating to the attacker. See "Plopping," Point Lookout for October 22, 2003, for more.
Are you being targeted by a workplace bully? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just USD 9.99. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenYHdUaScKeJzwbSUYner@ChacdFEDXIHcrdqqjjLcoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- The Costs of Threats
- Threatening as a way of influencing others might work in the short term. But a pattern of using threats
to gain compliance has long-term effects that can undermine your own efforts, corrode your relationships,
and create an atmosphere of fear.
- Responding to Threats: II
- When an exchange between individuals, or between an individual and a group, goes wrong, threats often
are either the cause or part of the results. If we know how to deal with threats — and how to
avoid and prevent them — we can help keep communications creative and constructive.
- Confronting the Workplace Bully: II
- When bullied, one option is to fight back, but many don't, because they fear the consequences. Confrontation
is a better choice than many believe — if you know what you're doing.
- Social Isolation and Workplace Bullying
- Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why
do bullies use it? What can targets do about it?
- Look Where You Aren't Looking
- Being blindsided by an adverse event could indicate the event's sudden, unexpected development. It can
also indicate a failure to anticipate what could have been reasonably anticipated. How can we improve
our ability to prepare for adverse events?
Forthcoming issues of Point Lookout
- Coming June 27: Interrupting Others in Meetings Safely: I
- In meetings we sometimes feel the need to interrupt others to offer a view or information, or to suggest adjusting the process. But such interruptions carry risk of offense. How can we interrupt others safely? Available here and by RSS on June 27.
- And on July 4: Interrupting Others in Meetings Safely: II
- When we feel the need to interrupt someone who's speaking in a meeting, to offer a view or information, we would do well to consider (and mitigate) the risk of giving offense. Here are some techniques for interrupting the speaker in situations not addressed by the meeting's formal process. Available here and by RSS on July 4.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenNzLYcPhJguoAMFNMner@ChacoCNnvJmuqJnhMgmhoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Race to the South Pole: The Power of Agile Development
- On 14 December 1911, four men led by Roald
Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen
had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished.
As historical drama, why this happened is interesting enough. Lessons abound. Among the more important
lessons are those that demonstrate the power of the agile approach to project management and product
development. Read more about this program. Here's
a date for this program:
- Ohio National Insurance, 1 Financial Way, Blue Ash, OH: July
Monthly Meeting, Cincinnati
chapter of the International Institute of Business Analysis. Register now.
- Ohio National Insurance, 1 Financial Way, Blue Ash, OH: July 17, Monthly Meeting, Cincinnati chapter of the International Institute of Business Analysis. Register now.
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.