Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 5;   February 3, 2016: Patterns of Conflict Escalation: I

Patterns of Conflict Escalation: I

by

Toxic workplace conflicts often begin as simple disagreements. Many then evolve into intensely toxic conflict following recognizable patterns.
Sen. Robert Packwood, Republican of Oregon

Sen. Robert Packwood, Republican of Oregon. He was a Senator from 1969 until he resigned under threat of expulsion in 1995. On the Sunday before Thanksgiving, 1992, shortly after the 1992 election in which Sen. Packwood was re-elected, the Washington Post reported that at least ten women staffers and lobbyists had complained that Senator Packwood had made unwanted, forceful, sexual advances on them, including groping and forceful kissing. The Senator had denied the women's claims, and attempted to erode their credibility. But on November 20, Senator Packwood issued an apology that has become famous as a template for non-apology apologies. It read, in part, "If any of my comments or actions have indeed been unwelcome or if I have conducted myself in any way that has caused any individual discomfort or embarrassment, for that I am sincerely sorry." The "If" in this statement is what makes it a non-apology.

Photo courtesy U.S. Senate.

Conflict resolution skills are universally recognized as valuable assets in modern organizations. And rightly so, because some people know, almost intuitively, exactly how to escalate conflicts from mild disagreements to near-warfare levels, without actually being caught doing it. While these destructive techniques might be of some short-term value to those who employ them, their use threatens the organizational mission.

Early recognition of these destructive patterns can dramatically reduce the incidence of toxic conflict in teams or groups that must frequently collaborate. That's why knowing how to recognize these patterns of conflict escalation is a skill perhaps even more valuable than conflict resolution.

Here is Part I of a little catalog of patterns that people use — sometimes inadvertently — to convert simple disagreements into workplace warfare. This part emphasizes behavior. Part II emphasizes patterns of thinking.

Accusations of marginal norm violations
Behavioral norms, explicit or implicit, govern social behavior in groups. For example, most workplace teams regard raised voices in meetings as violations of behavioral norms. (See "Preventing Toxic Conflict: II," Point Lookout for October 15, 2014, for more on behavioral norms)
Certainly identifying norm violations is necessary at times. But claims not supported by evidence, or claims of marginal violations, can be tools for advancing toxic conflict. Although such assertions can be genuine complaints about the behavior of alleged offenders, they can also be initial aggressive acts, or retaliations for perceived past transgressions. A pattern of claims about marginal transgressions can be a signal worth attending to.
Rejecting apologies
When someone (the Offeror) offers an apology to someone else (the Recipient), and the Recipient declines the offer or refuses to accept the apology, the Recipient deprives the group of an opportunity to put the offense behind it. That might be appropriate, if the apology is insincere or if the offense merits disciplinary action.
But if an apology is a suitable remedy for the offense, declining the apology can actually be an aggressive act intended to escalate the conflict. The rejection might appear innocent, or perhaps petulant, even though it is an act intended to deepen the conflict.
Non-apology apologies
Apologies that aren't Early recognition of patterns of
conflict escalation can dramatically
reduce the incidence of toxic
conflict in teams or groups that
must frequently collaborate
actually apologies have become so common that there is a term for them: non-apology apologies. They can appear in any of various forms. For example, "mistakes were made." Or the very popular "I'm sorry if you were offended (or hurt, or harmed, …)."
Although some people do offer non-apology apologies out of ignorance, it's unsafe to assume that non-apology apologies are always innocent. Because non-apology apologies can sometimes be acts of aggression, probing for truth is wise. To effectively prevent the non-apology apology from escalating the conflict, a third party can try to elicit a sincere apology, which must include a solid element of contrition. To the extent that such attempts do fail, the non-apology apology is more likely to be an aggressive act. For more on effective apologies, see "Demanding Forgiveness," Point Lookout for June 18, 2003.

We'll continue next time with more patterns of conflict escalation.  Next in this series Go to top Top  Next issue: Patterns of Conflict Escalation: II  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenVBfllhQAKyKEgYNpner@ChaciwOoLjkiXKodMcWhoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

The game of chess, a strategic metaphorNasty Questions: I
Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather, they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's political agenda. Here's part one a catalog of some favorite tactics.
A TSA Officer screening a passengerVirtual Termination with Real Respect
When we have to terminate someone who works at a remote site, sometimes there's a temptation to avoid travel — to use email, phone, fax, or something else. They're all bad ideas. Terminating people in person is not only a gesture of respect. It's good business.
Vincent's Bedroom in Arles, by Vincent Van GoghVirtual Conflict
Conflict, both constructive and destructive, is part of teamwork. As virtual teams become more common, we're seeing more virtual conflict — conflict that crosses site boundaries. Dealing with destructive conflict is difficult enough face-to-face, but in virtual teams, it's especially tricky.
A modern roller coaster showing an inverted portion of the tripHow Workplace Bullies Use OODA: II
Workplace bullies who succeed in carrying on their activities over a long period of time are intuitive users of Boyd's OODA model. Here's Part II of an exploration of how bullies use the model.
Probably not the kind of waiting we have in mind hereStrategic Waiting
Time can be a tool. Letting time pass can be a strategy for resolving problems or getting out of tight places. Waiting is an often-overlooked strategic option.

See also Conflict Management and Emotions at Work for more related articles.

Forthcoming issues of Point Lookout

Puppies waiting intently for a shot at the treatComing June 27: Interrupting Others in Meetings Safely: I
In meetings we sometimes feel the need to interrupt others to offer a view or information, or to suggest adjusting the process. But such interruptions carry risk of offense. How can we interrupt others safely? Available here and by RSS on June 27.
A VoiceStation 500 speakerphone by PolycomAnd on July 4: Interrupting Others in Meetings Safely: II
When we feel the need to interrupt someone who's speaking in a meeting, to offer a view or information, we would do well to consider (and mitigate) the risk of giving offense. Here are some techniques for interrupting the speaker in situations not addressed by the meeting's formal process. Available here and by RSS on July 4.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenZWHlmUnxgiNBvtdKner@ChacDVBdyXKMUmJHqSfPoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Race to the South Pole: The Power of Agile Development
On 14The Race to the Pole: An Application of Agile Development December 1911, four men led by Roald Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished. As historical drama, why this happened is interesting enough. Lessons abound. Among the more important lessons are those that demonstrate the power of the agile approach to project management and product development. Read more about this program. Here's a date for this program:

The Power Affect: How We Express Our Personal Power
Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Follow me at Google+ or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.