Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 15, Issue 8;   February 25, 2015:

Grace Under Fire: II

by

When we debate at work, things sometimes turn unpleasant. Out of control, one party might maneuver the other into losing control. If we have better tools for recognizing these tactics, we're better able to maintain self-control. Here's Part II of such a toolkit.
U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010

U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010. A more famous photograph of these two executives "conferring" depicts an exchange that occurred on the Phoenix-Mesa Gateway Airport tarmac in January 2012. In that photograph, taken by Haraz N. Ghanbari of the Associated Press, Gov. Brewer appears to be buttonholing the President, pointing her index finger at him in a most assertive manner. Because the interaction occurred in full public view, the Governor's actions were widely regarded as disrespectful, even hostile. So prevalent was that view, that the Governor had to deny any intention of hostility (see, for example, "Arizona Gov. Brewer Says She 'Was Not Hostile' in Meeting With Obama," a story available at the National Public Radio Web site).

I know of no direct evidence of the Governor's intentions in this incident. However, her behavior is consistent with what I call "ambushing" in this essay. The President's response — cool, measured attention — provides an outstanding example of the effective management of ambushes. Official White House Photo by Pete Souza.

In Part I of this exploration, we examined three tactics for causing other people to lose control. Skill in recognizing these tactics in the moment is helpful to anyone intent on remaining calm and resisting the urge to attack or to respond to insults in kind. But there are two other consequences of this kind of awareness. First, bystanders who recognize the tactics of manipulation are well equipped to intervene to halt the fracas before it expands. Second, and even more important, a general awareness of widespread ability to recognize these toxic behaviors is a deterrent to anyone considering employing them.

With these advantages in mind, consider four more examples.

Interrupting
Although interrupting others is widely regarded as rude, the effects of being interrupted vary from person to person. Interruptions can be so upsetting that graceless retaliation is difficult to avoid. And repeated, staccato interruption — badgering — can lead to angry outbursts by the person interrupted.
Startling
When startled, we're more likely to respond gracelessly. To exploit this, an attacker might approach a target stealthily from behind, and suddenly, and apparently affectionately, throw an arm around the target's shoulders. Or the attacker might enter the target's office unannounced at particularly inopportune moments. These methods use invasions of the target's personal space to induce fear responses. Personal space invasions are especially effective if the attacker has physically assaulted or threatened the target — or anyone known to the target — in the past.
Mock taunting or needling
To taunt is to provoke or ridicule with hurtful remarks. A mock taunt is a taunt delivered as if in jest, possibly with a wink or smile. Sometimes we call this behavior "needling." Attackers using this tactic expect their targets to be offended because the targets disregard the humorous wrapper. They expect bystanders to be duped by that wrapper. To bystanders, targets who respond gracelessly to the taunt then seem to be thin-skinned. The attacker can then deny intentionally inflicting pain, saying, "I didn't mean anything by it," or, "Can't you take a joke?" or "I didn't realize you were so touchy."
Ambushing
Ambush, especially in Ambush, especially in public,
depletes the target's ability
to maintain composure
public, depletes the target's ability to maintain composure by surprising the target in some way that threatens his or her ability to perform. For example, if the target is presenting to a small group virtually, and each remote site was to have received accompanying materials to be distributed in hardcopy, the attacker might deliver to some sites draft versions instead of the final versions, which might appear to be an honest mistake. The confusion can rattle the target, who then might not deal well with the attacker's probing or potentially embarrassing questions during the presentation.

Make a collection of the tactics you personally witness. They're most likely to come your way eventually.  Next in this series Go to top Top  Next issue: Virtual Trips to Abilene  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenEQuetChPjwYBDxmgner@ChacxXTxBssoFmfDfMugoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

Agreeing to a dealObstacles to Compromise
Compromise is the art of devising an approach acceptable to all parties. A talent for compromise is rare. What makes finding compromises so difficult?
Rabin and Arafat shake handsCommunication Templates: I
Some communication patterns are so widely used that nearly everyone in a given cultural group knows them. These templates demand certain prescribed responses, and societal norms enforce them. In themselves, they're harmless, but there are risks.
Allied leaders at the Yalta Conference in February, 1945Devious Political Tactics: More from the Field Manual
Careful observation of workplace politics reveals an assortment of devious tactics that the ruthless use to gain advantage. Here are some of their techniques, with suggestions for effective responses.
A schematic representation of the flagellar components of Salmonella enterica serovar TyphimuriumWhen Over-Delivering Makes Trouble
When responding to inquiries such as "Is that correct?" we sometimes err by giving too many reasons why it's incorrect. Patterns of over-delivery can lead to serious trouble. Here's how.
Male peponapis pruinosa — one of the "squash bees."Preventing Spontaneous Collapse of Agreements
Agreements between people at work are often the basis of resolving conflict or political differences. Sometimes agreements collapse spontaneously. When they do, the consequences can be costly. An understanding of the mechanisms of spontaneous collapse of agreements can help us craft more stable agreements.

See also Conflict Management and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

Bottom: Aerial view of the Forth Bridge, Edinburgh, Scotland. Top: Inside the Forth Rail Bridge, from a ScotRail 158 on August 22, 1999.Coming June 1: Mental Accounting and Technical Debt
In many organizations, technical debt has resisted efforts to control it. We've made important technical advances, but full control might require applying some results of the behavioral economics community, including a concept they call mental accounting. Available here and by RSS on June 1.
A goose and goslingsAnd on June 8: Flexible Queue Management
In meetings of 5-30 participants, managing the queue of contributors can be challenging. A strict first-in-first-out order can cause confusion and waste of time if important contributions are delayed. Some meetings need more flexible queue management. Available here and by RSS on June 8.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenEQuetChPjwYBDxmgner@ChacxXTxBssoFmfDfMugoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.