We began an exploration of impasses last time by focusing on the perspective of opinion minorities. In our scenario, we postulated that the group did have consensus on some issues, which we called the C-Issues. But there was disagreement on other issues — the D-Issues. In this Part II, we explore two tactics that tend to strengthen the impasse, preventing agreement.
- Hostage tactics
- Some group members believe that by taking hostages, they can compel the rest of the group to adopt a position more to their liking. The hostage of choice is often one or more of the C-Issues. In the view of the hostage takers, refusing to agree to the C-Issues exerts pressure on the rest of the group to comply with the hostage-takers' wishes. This tactic can become corrosive if members of the rest of the group press the hostage-takers to justify their opposition to the hostage C-Issues. The hostage-takers then devise arguments to justify their opposition to the C-Issues, which, often, they themselves don't believe. What little agreement there was with respect to C-Issues might then vanish. Even worse, others in the group might become intransigent, if they feel that acceding to the hostage-takers' demands will only invite further demands and further hostages, either by the hostage-takers or by others who witness the success of the hostage-takers.
- Acceding to hostage-takers' demands might seem appealing, but it does usually lead to more widespread hostage taking. Because questioning the hostage-takers about C-Issues risks converting C-Issues to D-Issues, approaches to forging agreement must always focus on D-Issues. Make the concerns of the objectors visible, and deal with them substantively.
- Abuse of the concept of precedent
- Some group members might fear that after they agree to the C-Issues, they won't be able to influence subsequent decisions sufficiently with respect to the D-Issues. They see partial agreement as the first step on a slippery slope, fearing that others will use their partial agreement as inappropriate leverage for later decisions. In effect, they fear they might be confronted with, "I don't see what your problem is with D-Issue #3, because you agreed to C-Issue #2." That tactic can indeed be an abuse of the concept of precedent, if it relies solely on the fact of agreeing to C-Issue #2, rather than on the substance of C-Issue #2, the substance of D-Issue #3, and their connection.
- If abuse of precedent Acceding to hostage-takers' demands
might seem appealing, but it does
usually lead to more
widespread hostage-takinghas occurred in the past, then certainly the concern is real, and the group must deal with it. To address the concern, the group can agree that such content-free appeals to precedents are unacceptable.
Hostage-taking by dissenters, or precedent abuse by those pressuring dissenters, are indirect attempts to gain adherents. To avoid strengthening impasses, deal directly with objections to agreement. First in this series | Next in this series Top Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenBhSajrEqlPrFAEULner@ChacNrofPfEPrWqGIGpYoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Conflict Management:
- Saying No
- When we have to say "no" to customers or to people in power, we're often tempted to placate
with a "yes." There's a better way: learn how to say "no" in a way that moves the
group toward joint problem solving.
- Communication Templates: II
- Communication templates are patterns that are so widely used that once identified, nearly everyone recognizes
them. In this Part II we consider some of the more toxic — less innocuous — communication
- How Targets of Bullies Can Use OODA: II
- To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not
sufficient — someone must make the bully stop. That's why counterattack is much more likely
- How to Create Distrust
- A trusting environment is critical to high performance. That's why it's important to recognize behaviors
that erode trust in others. Here's a little catalog of methods people use — intentionally or not
— to create distrust.
- Agenda Despots: II
- Some meeting Chairs crave complete or near-complete control of their meeting agendas. In this Part II
of our exploration of their techniques, we emphasize methods for managing unwanted topic contributions
Forthcoming issues of Point Lookout
- Coming February 27: Brainstorming and Speedstorming: II
- Recent research into the effectiveness of brainstorming has raised some questions. Motivated to examine alternatives, I ran into speedstorming. Here's Part II of an exploration of the properties of speedstorming. Available here and by RSS on February 27.
- And on March 6: A Pain Scale for Meetings
- Most meetings could be shorter, less frequent, and more productive than they are. Part of the problem is that we don't realize how much we do to get in our own way. If we track the incidents of dysfunctional activity, we can use the data to spot trends and take corrective action. Available here and by RSS on March 6.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenkyxmZrfchGvBAAtpner@ChacLzjmdJGcZwCkqwynoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.