![U.S. Congressman Jim Moran talks with constituents at a meeting on the federal budget U.S. Congressman Jim Moran talks with constituents at a meeting on the federal budget](../images/cong-moran-and-constituents.png)
U.S. Congressman Jim Moran talks with constituents at a meeting on the federal budget. From October 1 to October 16, 2013, the U.S. federal government was in a state of curtailed operations, commonly called a "shutdown," in which approximately 800,000 government workers were placed on unpaid leave. The cause of the shutdown was the failure of Congress to appropriate funds for operations after funds expired at the end of September. That failure, in turn, was caused by the inability of the U.S. House of Representatives to satisfy a minority of representatives who demanded the repeal of health care legislation enacted several years earlier. In effect, the minority held approval of operations funding hostage to achieve their desired goal of repeal of the health care legislation. In the end, their attempt failed. Funding was approved, and the legislation was not repealed.
On October 1, Rep. Moran delivered a speech in the House of Representatives in which he analyzed the maneuver of the minority as a hostage-taking. He was not alone. Public debate used the hostage terminology repeatedly. Indeed, a Google search for the phrase shutdown 2013 hostage yields over 600,000 results. Identifying maneuvers such as these as hostage takings can be helpful for bringing them to an end.
Photo courtesy U.S. House of Representatives.
When groups try to reach decisions, consensus is sometimes very desirable, if not required. But even if consensus isn't actually required, disagreements can cast doubt on any proposition that is eventually adopted. In these circumstances, impasses can block all forward progress. Because failure to reach agreement — or even serious difficulty in reaching agreement — can be problematic, it's useful to know how to deal with impasses.
We can deal effectively with substantive impasses by examining the issues fairly and openly. See "Impasses in Group Decision Making: I," Point Lookout for October 10, 2012, for a set of useful guidelines.
Nonsubstantive impasses arise not from the substance of the immediate issue, but from the dynamics of the group, its members, and its context. Because nonsubstantive impasses can arise in so many different ways, approaches to dealing with them are more varied than are the techniques for dealing with substantive impasses. Here are some examples of nonsubstantive impasses. In what follows, we'll use the term C-issues to denote the issues with respect to which the group is trying to reach consensus.
- Bargaining, extortion, and hostage taking
- Occasionally, dissenters exploit the group's need for consensus by demanding concessions on unrelated matters in exchange for their acquiescence. In effect, they hold consensus hostage.
- Progress is unlikely if the C-issues are the focus of negotiations between advocates and dissenters, because the dissenters usually are seeking unrelated concessions. Focus the discussion instead on that which motivates the dissent.
- External coercion
- Some dissenters are externally constrained to oppose the C-issues, independent of their personal views on the matter. For example, their superiors might oppose the issues, or the dissenters might believe that their superiors oppose the issues.
- In these cases, even though the dissenters engage in debate of the C-issues, such debate is pointless. The principals aren't the dissenters; the principals are those who are coercing or directing the dissenters. Carry the debate to the true principals.
- Confidential commitments
- Some members of the Nonsubstantive impasses arise not
from the substance of the issue,
but from the dynamics of the group,
its members, and its contextgroup might have made confidential commitments to each other or to other people who aren't present. Abiding by those commitments might be more or less difficult, depending on the proposal adopted by the group relative to the C-issues. Those who have made commitments therefore try to convince the group to adopt proposals that are in alignment with their confidential commitments. - It is the confidentiality that makes this mechanism so problematic. If the commitments could be revealed, resolving the conflict might be very easy. But those who are bound by the confidential commitments typically try to conceal the existence of the commitments by fabricating arguments in favor of positions consistent with their commitments, or arguments countering positions inconsistent with their commitments. The key to resolution is a private discussion, person-to-person, in which creating a sense of safety might facilitate disclosure of the commitment.
We'll continue next time with more examples of nonsubstantive impasses. First issue in this series
Next issue in this series
Top
Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcome
Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Conflict Management:
When You're the Target of a Bully
- Workplace bullies are probably the organization's most expensive employees. They reduce the effectiveness
not only of their targets, but also of bystanders and of the organization as a whole. What can you do
if you become a target?
Pumpers
- In workplace politics, some people always seem to be seeking information about others, but they give
very little in return. They're pumpers. What can you do to deal with pumpers?
How Targets of Bullies Can Use OODA: I
- Most targets of bullies just want the bullying to stop, but most bullies don't stop unless they fear
for their own welfare if they continue the bullying. To end the bullying, targets must turn the tables.
On Snitching at Work: I
- Some people have difficulty determining the propriety of reporting violations to authorities at work.
Proper or not, reporting violations can be simultaneously both risky and necessary.
Red Flags: I
- When we finally admit to ourselves that a collaborative effort is in serious trouble, we sometimes recall
that we had noticed several "red flags" early enough to take action. Toxic conflict and voluntary
turnover are two examples.
See also Conflict Management and Conflict Management for more related articles.
Forthcoming issues of Point Lookout
Coming January 29: A Framework for Safe Storming
- The Storming stage of Tuckman's development sequence for small groups is when the group explores its frustrations and degrees of disagreement about both structure and task. Only by understanding these misalignments is reaching alignment possible. Here is a framework for this exploration. Available here and by RSS on January 29.
And on February 5: On Shaking Things Up
- Newcomers to work groups have three tasks: to meet and get to know incumbent group members; to gain their trust; and to learn about the group's task and how to contribute to accomplishing it. General skills are necessary, but specifics are most important. Available here and by RSS on February 5.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
![Send email or subscribe to one of my newsletters](../images/social-icons/email-32.png)
![Follow me at LinkedIn](../images/social-icons/linkedin-reg-32.png)
![Follow me at X, or share a post](../images/social-icons/x-32.png)
![Subscribe to RSS feeds](../images/social-icons/feed-icon-32.png)
![Subscribe to RSS feeds](../images/social-icons/facebook-icon-32.png)
Recommend this issue to a friend
Send an email message to a friend
rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
![Technical Debt for Policymakers Blog](../images/logos/techdebtpolicy-logo-sm-1.png)