Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 16, Issue 47;   November 23, 2016:

Why People Hijack Meetings

by

When as chair of a meeting, you have difficulty completing a reasonable agenda, you might be the target of a hijacking. Here's Part I of a series exploring meeting hijacking.
Derailment of Northeast Illinois Regional Commuter Train 504 on September 17, 2005

Derailment of Northeast Illinois Regional Commuter Railroad Corporation (Metra) Train 504 in Chicago, Illinois, on September 17, 2005. Train derailments provide a useful metaphor for meeting hijackings, if we consider the train as the meeting, and the track as the agenda. Contributing causes to hijackings (derailments) can be found in the agenda (the tracks), the way the meeting is facilitated (the engineer's operation of the train), the attendee list (the passengers or freight), or sabotage by outside parties. Photo courtesy U.S. National Transportation Safety Board.

Meeting hijacking is widely defined as the result of the behavior of an individual who insists that the meeting participants discuss his or her preferred topic, instead of whatever is currently on the agenda. Although that situation could be a hijacking, the problem is both subtler and more complex.

For our purposes, we define a meeting hijacking as any attempt, in defiance of group norms, to take the meeting in a direction other than that determined by agreed-upon processes.

In the next issue, we'll catalog techniques hijackers use to hijack meetings. For now, let's explore why people try to hijack meetings.

In what follows, I'll use the names Horace or Harriet to refer to the attempted hijacker, in place of the awkward form "he or she."

Control
Some people hijack meetings to gain control of the group. They care less about content than they do about controlling the process. For example, they might want to undermine the chair's authority, hoping to demonstrate the chair's unsuitability for the role. Or they might be acting on behalf of powerful people, who might not even be present, if those people want the group to fail in its mission, for political reasons. Motivations abound.
Those who seek control of the meeting are not always "control addicts." Sometimes people seek control quite rationally, if for nefarious purposes.
Urgent sincerity
When Horace The choice of response to hijack
attempts depends to some extent
on the motives of the hijackers
urgently and sincerely believes that an issue must be addressed immediately, and when private attempts to convince the chair have failed to do so, he might attempt a hijacking. In one variety of urgent sincerity, Horace is laboring under a misapprehension of the actual issues facing the meeting. He might be either confused or misled by others. One can, after all, be sincerely mistaken.
Horace can accept that the matter won't be addressed, or alternatively, he can try to persuade the other participants during the meeting. The latter alternative fits most definitions of hijacking. Appropriate responses to such actions differ markedly from responses to the more nefarious control-motivated tactics.
Conspiracies
Harriet might not actually care much about the agenda she's disrupting, but she does disrupt it because of an agreement she made with someone who does care. Typically this happens when Harriet's co-conspirator, Horace, cannot hijack the meeting himself. He might have acquired a reputation that has put the meeting chair on guard, or he might not be present. He might have an obvious conflict of interest that would undermine his direct attempts to hijack the meeting, whereas Harriet's attempts might be more likely to appear to be sincere.
Most conspiracies are easily detected, but they often escape consideration as possible explanations for hijacking behavior because the idea seems so elaborate. Some feel reluctant to share the thought of conspiracy with others for fear of seeming "paranoid," to use the term in the lay sense. Conspiracies are most effective when they target people who can't accept their existence.

Motivations for hijack attempts vary widely. Your choice of response depends on what you think is actually happening. We'll examine hijacking techniques next time, and prevention in the issue after that.  Next in this series Go to top Top  Next issue: How to Hijack Meetings  Next Issue

101 Tips for Effective MeetingsDo you spend your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenXEiRBfuFHUtjHrqUner@ChacpYPvvSVhUNIOeXHKoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

A droplet ploppingPlopping
When we offer a contribution to a discussion, and everyone ignores it and moves on, we sometimes feel that our contribution has "plopped." We feel devalued. Rarely is this interpretation correct. What is going on?
Balancing talk time and the value of the contributionVirtual Blowhards
Controlling meeting blowhards is difficult enough in face-to-face meetings, but virtual meetings present next-level problems, because techniques that work face-to-face are unavailable. Here are eight tactics for dealing with virtual blowhards.
C. Northcote Parkinson in 1961Meeting Troubles: Collaboration
In some meetings, we collaborate not in reaching objectives, but in preventing our doing so. Here are three examples of this pattern.
Winston Churchill in the Canadian Parliament, December 30, 1941Interrupting Others in Meetings Safely: III
When we need to interrupt someone who's speaking in a meeting, we risk giving offense. Still, there are times when interrupting is in everyone's best interest. Here are some more techniques for interrupting in situations not addressed by the meeting's formal process.
A set of wrenches from a toolkitEffects of Shared Information Bias: I
Shared information bias is the tendency for group discussions to emphasize what everyone already knows. It's widely believed to lead to bad decisions. But it can do much more damage than that.

See also Effective Meetings and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

A beach at sunsetComing August 4: What Are the Chances: I
When estimating the probabilities of success of different strategies, we must often estimate the probability of multiple events occurring. People make a common mistake when forming such estimates. They assume that events are independent when they are not. Available here and by RSS on August 4.
Main Reading Room of the U.S. Library of CongressAnd on August 11: Many "Stupid" Questions Aren't
Occasionally someone asks a question that causes us to think, "Now that's a stupid question." Rarely is that assessment correct. Knowing what alternative assessments are possible can help us respond more effectively in the moment. Available here and by RSS on August 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenXEiRBfuFHUtjHrqUner@ChacpYPvvSVhUNIOeXHKoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
Please donate!The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!

Beware any resource that speaks of "winning" at workplace politics or "defeating" it. You can benefit or not, but there is no score-keeping, and it isn't a game.

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics!
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
My free weekly email newsletter gives concrete tips and suggestions for dealing with the challenging but everyday situations we all face.
A Tip A DayA Tip a Day arrives by email, or by RSS Feed, each business day. It's 20 to 30 words at most, and gives you a new perspective on the hassles and rewards of work life. Most tips also contain links to related articles. Free!
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.