Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 15, Issue 20;   May 20, 2015: Compulsive Talkers at Work: Peers I

Compulsive Talkers at Work: Peers I

by

Our exploration of approaches for dealing with compulsive talkers now continues, with Part I of a set of suggestions for what to do when a peer interferes with your work by talking compulsively.
Bored

Peers or near-peers who talk compulsively comprise the bulk of the problem cases of compulsive talking, perhaps because they're more willing to engage with their peers. Continuing our convention from last time, we refer to the compulsive talker by the name "Sydney." And let's assume that you're Sydney's target, that your own attempts to deal with Sydney openly and directly have been futile, and that your supervisor has been unable or unwilling to intervene effectively.

Dealing with peers, by necessity, cannot involve invoking organizational power. Instead, the strategies below work by limiting Sydney's access to you, while maintaining civility whenever possible.

Many of these suggestions involve dissembling, which can be ethically difficult for some, especially Sydney's friends. To deal with compunctions about dissembling, begin by accepting that there are no good options. Tolerating Sydney's intrusions affects both your ability to work and Sydney's; confronting Sydney even more directly could be hurtful and permanently so; dissembling would be an ethical breach that could lead to your being caught in a lie. The choice is yours, but careful dissembling usually presents the least risk.

Some tactics and strategies:

Reframe feelings of guilt
Some of these tactics might seem harsh. Concerns for Sydney are real, but usually overblown, because Sydney is probably accustomed to having others terminate conversations; he or she might actually expect it and understand it. The situation doesn't justify rudeness, but it does give you some additional space to maneuver.
Set limits
If Sydney Begin by accepting that
there are no good options
has phoned you, or found you despite your best evasive efforts, begin the conversation by setting a time limit: "I can talk for only two minutes." And when you reach that time, end it.
Don't let it start
If Sydney is more likely to accost you at particular times of day, be unavailable: out of the office, in a meeting, or on the phone. If alone in your office, wear your headset even though you aren't actually engaged. When Sydney appears, point to the earpiece.
Call my phone
If you have an assistant, have him or her call you or interrupt you. If not, numerous apps for smartphones and tablets enable you to simulate incoming phone calls, or actually schedule real incoming phone calls. Use one to create incoming calls that you can use as excuses for terminating the "conversation" with Sydney.
Use the washroom
If you and Sydney are opposite in gender, duck into a one-gender (yours) washroom. Some Sydneys will wait in the hallway, but the longer you take in the washroom the more likely is Sydney to walk away.
Walk away
Outside your office, you always have the choice to walk away. If Sydney catches you in your office, and leaving is an option, immediately stand, grab your laptop, tablet, or a notepad, and leave, explaining that you're late and can't talk.

We'll continue next time with more suggestions for limiting disruptions by peers who talk compulsively. First in this series  Go to top Top  Next issue: Compulsive Talkers at Work: Peers II  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

An elephant family drinking, Samburu National Reserve KenyaStalking the Elephant in the Room: I
The expression "the elephant in the room" describes the thought that most of us are thinking, and none of us dare discuss. Usually, we believe that in avoidance lies personal safety. But free-ranging elephants present intolerable risks to both the organization and its people.
Deepwater Horizon oil spill imagined in true color on May 17, 2010, by the MODIS instrument aboard NASA's TERRA satelliteHandling Heat: II
Heated exchanges in meetings can compromise both the organizational mission and the careers of the meeting's participants. Here are some tactics for people who aren't chairing the meeting.
Srinivasa RamanujanLinear Thinking Bias
When assessing the validity of problem solutions, we regard them as more valid if their discovery stories are logical, than we would if they're other than logical. This can lead to erroneous assessments, because the discovery story is not the solution.
A red flagRed Flags: I
When we finally admit to ourselves that a collaborative effort is in serious trouble, we sometimes recall that we had noticed several "red flags" early enough to take action. Toxic conflict and voluntary turnover are two examples.
"Approaching the fowl with stalking-horse", an 1875 illustration of a cut-out horse shape used in huntingBullying by Proxy: II
Bullying by proxy occurs when A bullies B at the behest of C. Organizational control of bullying by proxy is difficult, in part, because C's contribution is covert. Policies that control overt bullying are less effective at controlling bullying by proxy.

See also Conflict Management and Emotions at Work for more related articles.

Forthcoming issues of Point Lookout

A blue peacock of IndiaComing October 4: Self-Importance and Conversational Narcissism at Work: I
Conversational narcissism is a set of behaviors that participants use to focus the exchange on their own self-interest rather than the shared objective. This post emphasizes the role of these behaviors in advancing a narcissist's sense of self-importance. Available here and by RSS on October 4.
Men in conversation at an eventAnd on October 11: Self-Importance and Conversational Narcissism at Work: II
Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance. Available here and by RSS on October 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.