Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 18, Issue 30;   July 25, 2018: Exploiting Functional Fixedness: II

Exploiting Functional Fixedness: II

by

A cognitive bias called functional fixedness causes difficulty in recognizing new uses for familiar things. It also makes for difficulty in recognizing devious uses of everyday behaviors. Here's Part II of a catalog of deviousness based on functional fixedness.
Office equipment — or is it office toys?

Office equipment — or is it office toys?

Functional fixedness is a cognitive bias that causes us to see in familiar things only their familiar uses. For example, the brine from a jar of hot cherry peppers is an excellent copper cleaner. This was probably an accidental discovery, because functional fixedness would probably prevent most of us from trying it without having heard of it.

The workplace provides opportunities for exploiting functional fixedness to disguise one's true motives. In Part I of this exploration we examined three ordinary actions that could be used for purposes other than what they seem. Here are about a dozen more. In some of them, the person deceived is the same as the person deceiving.

  • Scheduling a meeting every week at a specific time to prevent others from scheduling meetings in that time slot
  • As a meeting's chair, adding an agenda item to consume time in a meeting, thus preventing the meeting from addressing a later agenda item you don't want to be addressed
  • As a meeting participant, wasting time in a meeting — being repetitive, asking unnecessarily detailed questions long-windedly, and so on — to prevent the meeting from addressing a later agenda item
  • As a meeting participant, raising an issue about a previously decided question to distract the group from another question that could prove uncomfortable for you
  • As a meeting participant, asking that the agenda The workplace provides opportunities
    for exploiting functional fixedness
    to disguise one's true motives
    items be re-ordered, claiming that you feel that one of the later items is urgent, when your actual purpose is to delay the item you want to avoid until later in the agenda, past the time when you know you'll have to leave for another meeting
  • Accepting an invitation to one meeting to have a reason to decline another meeting scheduled at the same time, and which you don't want to attend
  • Acquiring a new piece of equipment (computer, mobile phone, headset, eReader, whatever) to make yourself "more efficient" when you're actually seeking distraction from work you find boring or otherwise unpleasant
  • Stopping work and setting off down the hall for yet another cup of coffee for the same reason as the equipment thing
  • Tackling Task A, which you like, to justify delaying Task B, which you don't like, and to trick yourself into believing you're too busy to take on Task B
  • Volunteering to take responsibility for an undesirable but low-risk task to avoid being assigned responsibility for an undesirable and high-risk task
  • Dressing one or two notches above usual and leaving work early, to create the impression that you're interviewing somewhere for a new job, when you actually aren't doing any such thing
  • Asking a favor not to get the favor, but to determine whether the target would be willing to grant a favor
  • Baiting, bullying, threatening, or harassing someone just before a meeting, possibly privately, in order to put her or him on edge when you attack less directly during the meeting. The hope is that their response will be disproportionate to your criticism, which to others will appear to be fair.

You've probably noticed that many of these ploys are similar — they're the same pattern applied to different situations. That's a good thing, because it simplifies the task of recognizing variations when people use functional fixedness to conceal their true objectives. Watch carefully — you might find examples of your own to add to this collection. If you do, please send them along. First in this series  Go to top Top  Next issue: Strategies of Verbal Abusers  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Your comments are welcome

Would you like to see your comments posted here? rbrentSgXnAlNVWlhxNIJner@ChacAtZoEYrrmofzZnjPoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Bison on the U.S. National Bison Range in MontanaEmpire Building
Empire builders create bases of power within the larger organization. Typically, they use these domains to advance personal or provincial agendas. What are the characteristics of empires? How can we navigate through or around them?
The game of chess, a strategic metaphorNasty Questions: I
Some of the questions we ask each other aren't intended to elicit information from the respondent. Rather, they're poorly disguised attacks intended to harm the respondent politically, and advance the questioner's political agenda. Here's part one a catalog of some favorite tactics.
The spine of a human maleScopemonging: When Scope Creep Is Intentional
Scope creep is the tendency of some projects to expand their goals. Usually, we think of scope creep as an unintended consequence of a series of well-intentioned choices. But sometimes, it's much more than that.
Robert F. Scott and three of his party arrive at a tent left by Roald Amundsen near the South PoleManaging Non-Content Risks: I
When project teams and their sponsors manage risk, they usually focus on those risks most closely associated with the tasks — content risks. Meanwhile, other risks — non-content risks — get less attention. Among these are risks related to the processes and politics by which the organization gets things done.
Melrose Diner, Philadelphia, PennsylvaniaThe Power and Hazards of Anecdotes: II
Anecdotes are powerful tools of persuasion, but with that power comes a risk that we might become persuaded of false positions. Here is Part II of a set of examples illustrating some hazards of anecdotes.

See also Workplace Politics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A man in despair, as one might be following a layoffComing April 2: Mitigating the Trauma of Being Laid Off
Trauma is an emotional response to horrible events — accidents, crimes, disasters, physical abuse, emotional abuse, gross injustices — and layoffs. Layoff trauma is real. Employers know how to execute layoffs with compassion, but some act out of cruelty. Know how to defend yourself. Available here and by RSS on April 2.
A common image of bullying in actionAnd on April 9: Defining Workplace Bullying
When we set out to control the incidence of workplace bullying, problem number one is defining bullying behavior. We know much more about bullying in children than we do about adult bullying, and more about adult bullying than we know about workplace bullying. Available here and by RSS on April 9.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrentSgXnAlNVWlhxNIJner@ChacAtZoEYrrmofzZnjPoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.