Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 17, Issue 46;   November 15, 2017: Exploiting Functional Fixedness: I

Exploiting Functional Fixedness: I

by

Functional fixedness is a cognitive bias that creates difficulty in seeing novel uses of things that have familiar uses. Some devious moves in workplace politics exploit functional fixedness.
A meeting of people and their laptops

A meeting of people and their laptops. Maybe they need their laptops for some reason related to the content of the meeting. Maybe for some other reason. Hard to say.

In a 1945 monograph, Karl Duncker reported several experiments that demonstrated what he called functional fixedness. [Duncker 1945] Functional fixedness is our tendency to fail to recognize creative uses for objects when we know of — or shortly after we've been reminded of — conventional uses for those same objects. It's one of what we now call cognitive biases, which cause us to make systematic errors of thought or perception.

For example, everyone recognizes that coins are money, and that we can make purchases with them; not everyone recognizes that coins make effective doorstops when wedged into the space between the hinged side of an open door and the jamb. Upon seeing this "trick" for the first time a typical response is surprise — in part because of functional fixedness. (Light reading: "Ten Uses for Coins")

Much has been written about functional fixedness, especially in connection with creativity, because it can prevent people and teams from finding innovative solutions to important problems. But functional fixedness also has a dark side. It causes us to interpret the behavior of others in terms of the goals that those behaviors usually serve, even when those behaviors are serving a very different goal for the person who's using them. Here are three examples. I'll use fictitious names for people: Adrian and Brook.

Reserving a meeting room or conference facility
The usual way to reserve a facility for a meeting is to sign up for it using scheduling software. Another perhaps more effective method of reserving meeting space is to schedule a regular meeting in that space for the entire foreseeable future — six or twelve months. The meeting thus serves the purpose of reserving the meeting space, which for many regular meetings, can be more important than any item that ever appears on that meeting's agendas.
Functional To exploit functional fixedness,
use an everyday behavior
for some other purpose
fixedness causes us to interpret meetings as meetings, rather than as a means of reserving meeting facilities.
Asking for information
Usually, when we ask someone about X, what we want to know is X. But sometimes Adrian might ask Brook about X not to find out about X, but to determine whether Brook knows about X.
Functional fixedness prevents us from seeing this transaction as something different from an attempt to learn about X.
Delegation blockage
Usually, when a manager delegates a task T to someone, the purpose is to ensure that T will be completed. But sometimes the purpose of assigning a task T to Adrian is to keep Adrian busy, perhaps as a distraction, or perhaps to ensure that Adrian is unavailable for some other task T'. Maybe the manager doesn't trust Adrian to handle T', or the manager has promised T' to Brook. In such cases, the manager likely cares less about task T than about keeping Adrian from working on T'.
Functional fixedness can prevent us from seeing delegation as anything other than a way to partition responsibility.

When Adrian's phone rings, and she excuses herself from the meeting to take the call, we tend to assume that it's an important call. But what if Adrian has an app on her phone that makes fake calls? Yes, fake call apps do exist. They "work," in part, because of functional fixedness.  Interrupting Others in Meetings Safely: III Next issue in this series  Go to top Top  Next issue: Motivation and the Reification Error  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Duncker 1945]
Karl Duncker. "On problem solving," Psychological Monographs 58:5 (Whole No. 270) 1945. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Illegal trash dumpIllegal Dumping
To solve problems, we change existing policies or processes, or we create new ones. We try to make things better and sometimes we actually succeed. More often, we create new problems — typically, for someone else.
A 1940s-era trap fishing boatNasty Questions: II
In meetings, telemeetings, and email we sometimes ask questions that aren't intended to elicit information. Rather, they're indirect attacks intended to advance the questioner's political agenda. Here's part two of a catalog of some favorite tactics.
The Boy Who Cried Wolf, illustrated by Milo Winter in a 1919 Aesop anthologyWhy Don't They Believe Me?
When we want people to believe us, and they don't, it just might be a result of our own actions or demeanor. How does this happen?
Platform supply vessels battle the fire that was consuming remnants of the Deepwater Horizon oilrig in April 2010Managing Non-Content Risks: II
When we manage risk, we usually focus on those risks most closely associated with the tasks at hand — content risks. But there are other risks, to which we pay less attention. Many of these are outside our awareness. Here's Part II of an exploration of these non-content risks, emphasizing those that relate to organizational politics.
Eduardo Escobar called safe at secondExhibitionism and Conversational Narcissism at Work: I
Exhibitionism is one of four themes of conversational narcissism. Behavior considered exhibitionistic in this context is that which is intended to call the attention of others to the abuser. Here are six examples that emphasize exhibitionistic behavior.

See also Workplace Politics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A white water rafting team completes its courseComing December 11: White Water Rafting as a Metaphor for Group Development
Tuckman's model of small group development, best known as "Forming-Storming-Norming-Performing," applies better to development of some groups than to others. We can use a metaphor to explore how the model applies to Storming in task-oriented work groups. Available here and by RSS on December 11.
Tuckman's stages of group developmentAnd on December 18: Subgrouping and Conway's Law
When task-oriented work groups address complex tasks, they might form subgroups to address subtasks. The structure of the subgroups and the order in which they form depend on the structure of the group's task and the sequencing of the subtasks. Available here and by RSS on December 18.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.