Before investigating techniques for preventing meeting hijacking, let's distinguish hijacking from another serious but unrelated issue that's often confused with hijacking. That behavior pattern is known as "meeting bullying." Bullying is any behavior undertaken with the primary purpose of inflicting physical or psychological harm on another. Although bullying can happen in meetings, most bullies prefer other settings, unless they're chairing the meeting, or unless they've already gained the acquiescence of the Chair somehow, possibly by bullying or intimidation. Unless one of these conditions is met, the meeting Chair is free to challenge the bully, which most bullies would experience as public humiliation. For this reason, much of what is commonly called meeting bullying is actually something else — outrageously bad behavior, or uncontrolled anger, to cite two examples.
Bullying, wherever it occurs, should be addressed by the bully's supervisor or by Human Resources officials. Meeting Chairs typically can't do much about it. If bullying does occur in a meeting, the only safe course for the meeting Chair is to immediately adjourn the meeting and consult with officials empowered to deal with such problems. Address the problem officially and privately.
Let's now explore how to prevent meeting hijackings. These approaches are founded on two principles. First, identify potential meeting hijackers in advance, and second, deprive them of opportunities for success. This prevention-based approach is yet another example of the idea that it's a lot easier to stay out of trouble than to get out of trouble.
Continuing our customary practice, we'll refer to our meeting hijackers as Horace or Harriet.
- Identify potential meeting hijackers
- Attributes of potential hijackers include a track record of past hijackings; energetic pre-meeting lobbying for an item to be included in the agenda; a sudden break in a pattern of skipping meetings; being a close friend of a known hijacker; a pattern of arriving late and asking for a "quick summary;" and so on.
- If Horace exhibits one or more of these indicators, consider having a conversation with him in advance of the meeting. If he is intent on disruption, try to find an accommodation that doesn't involve deviating from the agenda you've set. If you can't gain an agreement not to disrupt the meeting, or if the agreement you do secure is violated, then Horace is exhibiting a performance issue. Only his supervisor can deal with that.
- Limit the hijacker's access to tools
- The First, identify potential meeting
hijackers in advance, and
second, deprive them of
opportunities for successoverall goal of this limited-access strategy is to close the hijacker's access to the normal means of adjusting the agenda. For example, in advance of the meeting, the Chair can solicit agenda items from attendees during a limited period.
- After rejecting with justification Harriet's proposed agenda item, the Chair can close the agenda item solicitation and advise everyone that at the meeting the agenda will be open for addition of any items not previously deemed unsuitable for this meeting.
Techniques like these are eminently fair. They don't directly target any potential hijackers. Next time, we'll examine tactics for use in the meeting itself. First in this series | Next in this series Top Next Issue
Do you spend
your days scurrying from meeting to meeting? Do you ever wonder if all these meetings are really necessary? (They aren't) Or whether there isn't some better way to get this work done? (There is) Read 101 Tips for Effective Meetings to learn how to make meetings much more productive and less stressful — and a lot more rare. Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrennhjFpKiptLqOuNkaner@ChacNWWwmjVQxBMLXOZwoCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Effective Meetings:
- Discussion Distractions: I
- Meetings could be far more productive, if only we could learn to recognize and prevent the distractions
that lead us off topic and into the woods. Here is Part I of a small catalog of distractions frequently
seen in meetings.
- Blind Agendas
- Effective meetings have agendas. But even if a meeting has an agenda, the hidden agendas of participants
can cause trouble. Another source of trouble, less frequently recognized, is the blind agenda.
- How to Ruin Meetings
- Much has been written about how to conduct meetings effectively. Here are some reliable techniques for
doing something else altogether.
- Agenda Despots: I
- Many of us abhor meetings. Words like boring, silly, and waste come to mind. But for some meeting Chairs,
meetings aren't boring at all, because they fear losing control of the agenda. To maintain control,
they use the techniques of the Agenda Despots.
- The End-to-End Cost of Meetings: III
- Many complain about attending meetings. Certainly meetings can be maddening affairs, and they also cost
way more than most of us appreciate. Understanding how much we spend on meetings might help us get control
of them. Here's Part III of a survey of some less-appreciated costs.
Forthcoming issues of Point Lookout
- Coming July 18: High Falutin' Goofy Talk: III
- Workplace speech and writing sometimes strays into the land of pretentious but overused business phrases, which I like to call high falutin' goofy talk. We use these phrases with perhaps less thought than they deserve, because they can be trite or can evoke indecorous images. Here's Part III of a collection of phrases and images to avoid. Available here and by RSS on July 18.
- And on July 25: Exploiting Functional Fixedness: II
- A cognitive bias called functional fixedness causes difficulty in recognizing new uses for familiar things. It also makes for difficulty in recognizing devious uses of everyday behaviors. Here's Part II of a catalog of deviousness based on functional fixedness. Available here and by RSS on July 25.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyWBRBHkRwRrwdTRPner@ChacMfnVNhDHOxVKzFgaoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, USD 11.95)
- Get 2003-4 in Why Dogs Wag (PDF, USD 11.95)
- Get 2005-6 in Loopy Things We Do (PDF, USD 11.95)
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, USD 11.95)
- Get 2009-10 in The Questions Not Asked (PDF, USD 11.95)
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, USD 28.99)
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500 words in your inbox in one hour. License any article from this Web site. More info
- The Race to the South Pole: The Power of Agile Development
- On 14 December 1911, four men led by Roald
Amundsen reached the South Pole. Thirty-five days later, Robert F. Scott and four others followed. Amundsen
had won the race to the pole. Amundsen's party returned to base on 26 January 1912. Scott's party perished.
As historical drama, why this happened is interesting enough. Lessons abound. Among the more important
lessons are those that demonstrate the power of the agile approach to project management and product
development. Read more about this program. Here's
a date for this program:
- Ohio National Insurance, 1 Financial Way, Blue Ash, OH: July
Monthly Meeting, Cincinnati
chapter of the International Institute of Business Analysis. Register now.
- Ohio National Insurance, 1 Financial Way, Blue Ash, OH: July 17, Monthly Meeting, Cincinnati chapter of the International Institute of Business Analysis. Register now.
- The Power Affect: How We Express Our Personal Power
- Many people who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.