Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 18, Issue 17;   April 25, 2018:

Narcissistic Behavior at Work: VI

by

Narcissistic behavior at work distorts decisions, disrupts relationships, and generates toxic conflict. These consequences limit the ability of the organization to achieve its goals. In this part of our series we examine the effects of exploiting others for personal ends.
Mistletoe growing in abundance in the Wye Valley, Wales

Mistletoe growing in abundance in the Wye Valley, Wales. Mistletoe is a parasitic plant, which means that it derives significant nutrients from living plant hosts. These mistletoes are parasitic on trees.

Those who exploit others for their own ends are parasitic on those they exploit. They use others as sources of something they need. What they derive from others can be, for example, credit for producing value. But what they derive from others need not be of value to anyone else. It can also be conflict, suffering, or pain, if the exploiter's need is to see others engage in conflict, or to see others suffer. Photo courtesy Wikipedia.

In modern organizations, people working alone contribute only a small part of what their organizations do. For example, most knowledge work requires cooperation. If people can't get along with each other, they're unhappy, and their work usually suffers. One of the more common causes of hurt feelings and disrupted relationships is exploitation of one person by another for personal ends. People who feel they've been exploited sometimes retaliate, sometimes shut down, and sometimes depart for more hospitable and nurturing environments. All these outcomes harm the organization.

As a reminder, the behaviors and attitudes typically regarded as narcissistic are these:

Let's now have a closer look at the sixth item above: exploiting others for personal ends. For convenience in this series, I've been referring to the person exhibiting narcissistic behaviors and attitudes as either Nick or Nora. This time, it's Nick.

Illustrations
A typical A typical form of exploitation
is taking credit personally for
contributions others have produced
form of exploitation is taking credit personally for contributions others have produced, commonly called credit theft or credit appropriation. This behavior has a mate of the opposite polarity: blame shifting. By pre-emptively blaming others for failures, Nick avoids having to put on a defense about those failures. Other forms of exploitation include making others feel stupid and hijacking meetings.
Exploitation at work need not be work-related. For example, by suggesting the possibility of romantic involvement, one person can induce another to provide a favor. The reverse exchange is also possible: by using the power of one's position to provide a favor, or to threaten, one person can induce another to provide favors of a more intimate nature.
Description
The variety of ways Nick can exploit other people for his own ends is breathtaking. The overt acts of exploitation, such as those offered above as illustrations, are unsurprising. Of greater interest is covert exploitation.
Consider a somewhat common situation: contending for promotion. Nick might exploit the other contenders by arranging covertly to create traps for his competitors that might reduce their chances of promotion. He might spread rumors about them. If a contender's project needs the assistance of someone with rare skills, Nick might arrange for that person to be unavailable. Or Nick might charm others into forming a tight alliance that excludes the other contender. By these means he exploits the foibles and weaknesses of the other contenders to increase his own chances of promotion.
Homework: select another situation and work out how Nick's narcissistic exploitation of others to advance his own personal goals can distort the way that situation evolves.
Organizational risks
One common result of Nick's exploiting others for personal ends is distortion of the organization's perception of which people or groups are producing (or failing to produce) value. Consequently, organizational decision makers are at risk of making personnel decisions that are inconsistent with achieving organizational goals.
There are other effects less common but potentially more significant. For example, if Nick attains an elevated level of responsibility for determining organizational goals, he might choose to bias his decisions in the direction of his own personal advantage. When his decisions directly benefit himself or his family members, the conflict of interest is overt and usually preventable. But he can conceal his conflict of interest by conspiring covertly with other similarly situated individuals to "swap" decisions, each benefiting the other. See "Budget Shenanigans: Swaps," Point Lookout for May 14, 2003, for examples of swaps.
These examples of exploitation are less common only because Nick requires the ability to influence the direction of the enterprise. But they can produce substantial benefit for Nick, and substantial harm for the enterprise.
Coping tactics
As Nick's supervisor, two concerns are paramount. First, if Nick has engaged in narcissistic behavior often enough to alert you to the possibility that he exploits others, or the enterprise, for personal gain, wake up your inner detective. Interview Nick's potential targets privately to determine the truth about who creates value for the enterprise and who does not. Second, if Nick has significant decision-making authority, investigate his decisions closely enough to ensure that they are in true alignment with enterprise objectives. And don't rely on the appearance of legitimacy — look carefully for swaps.
As Nick's co-worker, be aware that he's probably much more adroit at exploiting you than you are at defending yourself from exploitation. Be alert to Nick's use of charm and deceit to induce you to make choices you wouldn't otherwise make. Trust your intuition.
As Nick's subordinate, if he's shown an inclination to take credit for the work of subordinates, make sure others know what you're working on. If Nick demands secrecy, or otherwise prevents you from making your contributions public, that's an indicator of elevated risk of credit theft. Make your work so spectacular and so ridden with subtleties that if Nick is asked about particular details, he cannot possibly explain them.

Next time, we'll examine ruthless disregard for the feelings of others. First in this series  Next in this series Go to top Top  Next issue: Narcissistic Behavior at Work: VII  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrenKyrpMiqBnnUUPnWHner@ChacgEbnSaDGlMyKFJgtoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

A credit thiefDevious Political Tactics: Credit Appropriation
Managers and supervisors who take credit for the work of subordinates or others who feel powerless are using a tactic I call Credit Appropriation. It's the mark of the unsophisticated political operator.
Then-Capt. Elwood R. Quesada who became commanding general of the 9th Fighter Command in operation OverlordGroup Problem-Solving Tangles
When teams solve problems together, discussions of proposed solutions usually focus on combinations of what the solution will do, how much it will cost, how long it will take, and much more. Disentangling these threads can make discussions much more effective.
President George W. Bush of the United States and Crown Prince Abdullah of Saudi ArabiaSocial Transactions: We're Doing It My Way
We have choices about how we conduct social transactions — greetings, partings, opening doors, and so on. Some transactions require that we collaborate with others. In social transactions, how do we decide whose preferences rule?
U.S. President Barack Obama and Arizona Governor Jan Brewer conferring in the Oval Office in 2010Grace Under Fire: II
When we debate at work, things sometimes turn unpleasant. Out of control, one party might maneuver the other into losing control. If we have better tools for recognizing these tactics, we're better able to maintain self-control. Here's Part II of such a toolkit.
Representative Don Young, Republican of AlaskaAppearance Antipatterns: I
Appearances can be deceiving. Just as we can misinterpret the actions and motivations of others, others can misinterpret our own actions and motivations. But we can take steps to limit these effects.

See also Workplace Politics and Devious Political Tactics for more related articles.

Forthcoming issues of Point Lookout

Sherlock Holmes and Doctor WatsonComing May 19: Pre-Decision Discussions: Reasoning
When we meet to resolve issues related to upcoming decisions, we sometimes rely on reasoning to help find solutions. Contributions to these discussions generally use mixtures of deductive, inductive, and abductive reasoning. How do they differ, and what are their strengths and risks? Available here and by RSS on May 19.
A bullying managerAnd on May 26: Even "Isolated Incidents" Can Be Bullying
Many organizations have anti-bullying policies that address only repeated patterns of interpersonal aggression. Such definitions expose the organization and its people to the harmful effects of "isolated incidents" of interpersonal aggression, because even isolated incidents can be bullying. Available here and by RSS on May 26.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenKyrpMiqBnnUUPnWHner@ChacgEbnSaDGlMyKFJgtoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Public seminars

The Power Affect: How We Express Our Personal Power

Many The Power Affect: How We Express Personal Powerpeople who possess real organizational power have a characteristic demeanor. It's the way they project their presence. I call this the power affect. Some people — call them power pretenders — adopt the power affect well before they attain significant organizational power. Unfortunately for their colleagues, and for their organizations, power pretenders can attain organizational power out of proportion to their merit or abilities. Understanding the power affect is therefore important for anyone who aims to attain power, or anyone who works with power pretenders. Read more about this program.

Bullet Points: Mastery or Madness?

DecisBullet Point Madnession-makers in modern organizations commonly demand briefings in the form of bullet points or a series of series of bullet points. But this form of presentation has limited value for complex decisions. We need something more. We actually need to think. Briefers who combine the bullet-point format with a variety of persuasion techniques can mislead decision-makers, guiding them into making poor decisions. Read more about this program.

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.