When two or more parties work out their differences, they often employ explicit agreements. Written or oral, signed or unsigned, agreements spell out what will be exchanged and when, or what the parties will refrain from doing. Agreements are essential to collaborative work in the context of constrained resources.
When agreements collapse spontaneously, there is no apparent external cause. Even when external conditions remain unchanged, agreements can implode. Distrust and rancor can follow, jeopardizing the possibility of future agreements. Because the long-term consequences of collapse can be more severe, unpleasant, and debilitating than the collapse itself, skill in crafting stable agreements is a valuable asset.
Here are some of the attributes of stable agreements.
- They're voluntary
- Stable agreements are voluntary. Neither party is coerced by the other, or by any other party. For example, the supervisor who addresses toxic conflict between subordinates by ordering them to "work it out or else" is establishing conditions for an unstable agreement.
- If coercion drives the bargain, the agreement can remain stable only as long as the coercion remains effective.
- Information quality is symmetric
- Both parties have equal access to information about the context of the agreement and the value of the items exchanged. That is, one party estimates the fairness of the agreement about as accurately as the other. Information quality asymmetry is especially troublesome when the advantaged party knows that the disadvantaged party is agreeing to an unfair exchange, or when the advantaged party intentionally misleads the disadvantaged party.
- When the truth finally becomes apparent, the disadvantaged party often feels harmed. Relationships degrade. The agreement collapses.
- There are incentives for preserving the confidentiality of confidential terms
- When agreements have If coercion drives the bargain,
the agreement can remain
stable only as long as the
coercion remains effectiveconfidential components, stability requires that there be incentives for maintaining that confidentiality. For example, when an agreement must remain confidential for delicate policy reasons, a trap awaits: the first party to disclose the agreement can sometimes shift responsibility for the need for delicacy onto the other party, even after harvesting value from the agreement.
- When agreements are confidential, they must address the problem of incentives for first disclosure.
- Value exchange is contemporaneous
- Perhaps the most important stabilizer of agreements is simultaneity of exchange. If one party harvests value from the agreement before the other, or faster than the other, then the earlier harvester has an incentive to renege after having harvested enough value. Such an agreement becomes a form of "I'll scratch your back; you stab me in mine."
- Working out contemporaneous exchanges can be difficult, sometimes requiring streams of small bits. Finding workable decompositions can require some cleverness.
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Conflict Management:
- Questioning Questions
- In meetings and other workplace discussions, questioning is a common form of conversational contribution.
Questions can be expensive, disruptive, and counterproductive. For most exchanges, there is a better way.
- Deniable Intimidation
- Some people achieve or maintain power by intimidating others in deniable ways. Too often, when intimidators
succeed, their success rests in part on our unwillingness to resist, or on our lack of skill. By understanding
their tactics, and by preparing responses, we can deter intimidators.
- Virtual Conflict
- Conflict, both constructive and destructive, is part of teamwork. As virtual teams become more common,
we're seeing more virtual conflict — conflict that crosses site boundaries. Dealing with destructive
conflict is difficult enough face-to-face, but in virtual teams, it's especially tricky.
- The Advantages of Political Attack: I
- In workplace politics, attackers sometimes prevail even when the attacks are specious, and even when
the attacker's job performance is substandard. Why are attacks so effective, and how can targets respond
- Dealing with Deniable Intimidation
- Some people use intimidation so stealthily that only their targets recognize the behavior as abusive
or intimidating. Targets are often so frustrated, angered, and confused that they cannot find suitable
Forthcoming issues of Point Lookout
- Coming April 1: Incompetence: Traps and Snares
- Sometimes people judge as incompetent colleagues who are unprepared to carry out their responsibilities. Some of these "incompetents" are trapped or ensnared in incompetence, unable to acquire the ability to do their jobs. Available here and by RSS on April 1.
- And on April 8: Intentionally Misreporting Status: I
- When we report the status of the work we do, we sometimes confront the temptation to embellish the good news or soften the bad news. How can we best deal with these obstacles to reporting status with integrity? Available here and by RSS on April 8.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenmhXARWRMUvVyOdHlner@ChacxgDmtwOKrxnripPCoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.