In some groups or teams, dissent can be personally risky wherever it occurs — hallway conversation, email, meetings, over lunch, wherever. Last time we described general-purpose techniques some group Leaders use to suppress dissent. In meetings, though, leaders have a wide array of tools for effectively suppressing dissent.
I'm not advocating techniques for suppressing dissent, which is almost always unwise, and probably unethical. Rather, I offer this inventory as a guide to help people recognize patterns of abuse.
- Controlling the time and place of meetings
- Leaders acting in good faith try to schedule meetings to enable most people to attend. If schedule or location (real or virtual) must change, they announce changes to everyone as soon as possible. Leaders who are determined to create attendance obstacles for specific people, such as Dissenters, can choose times and places accordingly. And they can distribute change announcements accordingly, too.
- Controlling invitation and distribution lists
- By omitting Dissenters from meeting invitation lists or email distribution lists, Leaders can reduce the probability that Dissenters will receive important information, or be able to attend meetings, whether or not the information or meeting agenda is relevant to the substance of the dissent. These schemes can thus create what appear to be performance issues for Dissenters, which can affect their stature and credibility.
- Abusing agenda responsibility
- Leaders, who are typically responsible for meeting agendas, can adjust agendas to the disadvantage of Dissenters. Scheduling items so as to make Dissenters' own schedules more difficult, or allocating too little time to Dissenters' items, can create obstacles for Dissenters.
- Abusing the parking lot
- The Those who become accustomed to
suppressing dissent sometimes
experience expressions of
disagreement as challenges
to their personhood"parking lot" is a list of topics that arise during a meeting, but which aren't closely enough related to the agenda to warrant immediate attention. The Leader can arrange to "park" any points Dissenters raise, whether or not they're eligible for parking according to the usual criteria. And after the meeting, instead of dealing with the Dissenter's parked items, the Leader can arrange for them to be quietly ignored. For more about the parking lot, see "Using the Parking Lot," Point Lookout for September 12, 2007.
- Abusing the facilitator's prerogatives
- Many Leaders also facilitate their own meetings. As facilitators, they can influence the flow of their meetings by recognizing attendees who wish to comment or contribute to the discussion. They can decide what comments are germane, and they can interrupt contributors. When a contributor is speaking, and another attendee interrupts, Leaders can be selective about halting such interruptions. Although people generally frown upon arbitrariness in exercising the facilitator's prerogatives, in most organizations, attendees can't do much more. Objecting to a Leader's meeting management practices can be risky.
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Your comments are welcomeWould you like to see your comments posted here? rbrencufVHdTQIyKQVVJZner@ChacsDvidVLsPkceUjdxoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Devious Political Tactics:
- Devious Political Tactics: Cutouts
- Cutouts are people or procedures that enable political operators to communicate in safety. Using cutouts,
operators can manipulate their environments while limiting their personal risk. How can you detect cutouts?
And what can you do about them?
- Active Deceptions at Work
- Among the vast family of workplace deceptions, those that involve presenting fiction as reality are
among the most exasperating, because we sometimes feel fooled or gullible. Lies are the simplest example
of this type, but there are others, and some are fiendishly clever.
- Behavioral Indicators of Political Risk
- Avoiding dangerous political interactions is easier if you know what to look for. Among the indicators
of possible trouble are the behaviors of the people around you.
- How to Hijack Meetings
- Recognizing the tactics meeting hijackers use is the first step to reducing the incidence of this abuse.
Here are some of those tactics.
- Narcissistic Behavior at Work: IV
- Narcissistic behavior at work is more damaging than rudeness or egotism. It leads to faulty decisions
that compromise organizational missions. In this part of the series we examine the effects of constant
demands for attention and admiration.
Forthcoming issues of Point Lookout
- Coming February 27: Brainstorming and Speedstorming: II
- Recent research into the effectiveness of brainstorming has raised some questions. Motivated to examine alternatives, I ran into speedstorming. Here's Part II of an exploration of the properties of speedstorming. Available here and by RSS on February 27.
- And on March 6: A Pain Scale for Meetings
- Most meetings could be shorter, less frequent, and more productive than they are. Part of the problem is that we don't realize how much we do to get in our own way. If we track the incidents of dysfunctional activity, we can use the data to spot trends and take corrective action. Available here and by RSS on March 6.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenxffxgcUacuazAQIAner@ChacBjRMOtuPlOoETaChoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.