Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 19, Issue 32;   August 7, 2019: Workplace Politics and Social Exclusion: I

Workplace Politics and Social Exclusion: I

by

In the workplace, social exclusion is the practice of systematically excluding someone from activities in which they would otherwise be invited to participate. When used in workplace politics, it's ruinous for the person excluded, and expensive to the organization.
Three gulls excluding a fourth

A member or members of a social group can be the targets of a tactic called social exclusion if another member or members of that group acts to exclude them from group activities in which the excluded persons would otherwise be invited to participate. This definition is overly broad for our purposes, because it includes such macro-societal processes as racial segregation and voter suppression. Our interest is much narrower; namely, social exclusion as it occurs in workgroups. Definitions vary, but some call this phenomenon workplace ostracism [Fiset 2017]; some call it workplace exclusion [Hitlan 2009]. Here's an example:

Geoff is new to the group, recently hired over Marie's openly expressed objections. He's expected to assume responsibility for a set of activities that Marie has been handling. Her effectiveness has been limited because of her oppressive workload, and because the activities in question really are outside her area of expertise, and even outside her area of interest. Nevertheless, ever since Geoff reported for work, Marie has been on a campaign of social exclusion. She doesn't invite Geoff to the meetings he needs to attend; she excludes him from email messages that announce or discuss matters that are important for Geoff to know; and she uses her control of access rights to the group's SharePoint sites to limit Geoff's ability to find information on his own.

It isn't difficult to add more detail to this scenario, of course, but you probably get the idea: Marie is using social exclusion to sabotage Geoff's job performance.

Bullies also use social exclusion, but they do so for very specific reasons. When bullies use social exclusion, they intend to inflict pain on the target by limiting the target's access to social support. And because targets of bullies can use social support to execute defensive or counter-offensive maneuvers, social exclusion also helps the bully by limiting the target's access to social support. But social exclusion in the bullying context isn't our focus here. Our focus is the use of social exclusion in political conflict; that is, its use in struggles for control or dominance, or as a means of imposing a particular decision on people who might otherwise reject that decision.

We can analyze this problem according to the number of Social exclusion can be
carried out on the basis of
the professional role of the target,
the organizational role of the target,
or personal attributes of the target
people involved. On the part of the users of social exclusion tactics, we can have either one individual or many; similarly on the part of those excluded, we can also have either one individual or many. The simplest problem is 1-by-1, mainly because of the reduced incidence of differences of opinion and levels of commitment on any one side. So let's consider the 1-by-1 case, exemplified above by Marie (the Excluder) and Geoff (the Excluded).

To execute social exclusion tactics, excluders usually rely on one or more of three factors — the professional role of the target, the organizational role of the target, and personal attributes of the target. Each kind of exclusion has its own characteristic set of results. Each kind suggests its own characteristic set of responses by the target. In this Part I, we explore the effects of excluding someone on the basis of professional role.

In what follows, the name "Marie" denotes someone using social exclusion in a 1-by-1 context. And the name "Geoff" denotes the person Marie is trying to exclude.

Professional role of the target
In situations in which the professional role of the target provides the principal motivation for Marie's use of social exclusion, she has advantages that enable her to conceal what she's doing. For example, she can be warm and cordial toward Geoff in public settings, to convey the impression that she is supportive and respectful. And she can exclude Geoff from meetings or conversations when his role threatens her most, including him only when she has little to lose by his presence. For instance, if Geoff represents the Marketing function for the Marigold product, Marie can include him in meetings that don't address marketing issues, or which don't address Marigold marketing. When excluders can be selective in this way, they can obfuscate the exclusion pattern, which helps them conceal their exclusion tactics and provides them a defense if their actions are ever questioned.
However, even when Marie excludes Geoff selectively, he's likely to notice that Marie's actions are affecting his job performance. He would be wise to accumulate data about the exclusion before registering a complaint with Marie or with anyone else. To be effective, the data must provide unambiguous evidence of the pattern, even if Marie has been selective about excluding Geoff. Actually, her selectivity can strengthen Geoff's case: "Marie invites me only to meetings that I wouldn't want to attend."

Next time, we'll examine exclusion on the basis of organizational affiliation and exclusion on the basis of more personal factors. We'll close next time with a brief look at the organizational consequences of this practice, and what might be required to control it.  Next in this series Go to top Top  Next issue: Workplace Politics and Social Exclusion: II  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Fiset 2017]
John Fiset, Raghid Al Hajj, and John G. Vongas. "Workplace ostracism seen through the lens of power," Frontiers in Psychology 8, (2017), 1528. Available here. Retrieved 25 April 2021. Back
[Hitlan 2009]
Robert T. Hitlan and Jennifer Noel. "The influence of workplace exclusion and personality on counterproductive work behaviours: An interactionist perspective," European Journal of Work and Organizational Psychology 18:4 (2009), 477-502. Available here. Back

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

Humans aren't the only species that communicates by facial expressionsDismissive Gestures: II
In the modern organization, since direct verbal insults are considered "over the line," we've developed a variety of alternatives, including a class I call "dismissive gestures." They hurt personally, and they harm the effectiveness of the organization. Here's Part II of a little catalog of dismissive gestures.
President George W. Bush of the United States and Crown Prince Abdullah of Saudi ArabiaSocial Transactions: We're Doing It My Way
We have choices about how we conduct social transactions — greetings, partings, opening doors, and so on. Some transactions require that we collaborate with others. In social transactions, how do we decide whose preferences rule?
Red raspberriesEgo Depletion: An Introduction
Ego depletion is a recently discovered phenomenon that limits our ability to regulate our own behavior. It explains such seemingly unrelated phenomena as marketing campaign effectiveness, toxic conflict contagion, and difficulty losing weight.
An egg sandwichThe Power and Hazards of Anecdotes: I
Anecdotes are short stories — sometimes just a single sentence. They're powerful tools of persuasion, but they can also be dangerous, to both anecdote tellers and anecdote listeners.
Benjamin Franklin portrait by Joseph Siffred DuplessisClouted Thinking
When we say that people have "clout" we mean that they have more organizational power or social influence than most others do. But when people with clout try to use it in realms beyond those in which they've earned it, trouble looms.

See also Workplace Politics and Effective Meetings for more related articles.

Forthcoming issues of Point Lookout

Three gears in a configuration that's inherently locked upComing April 24: Antipatterns for Time-Constrained Communication: 1
Knowing how to recognize just a few patterns that can lead to miscommunication can be helpful in reducing the incidence of problems. Here is Part 1 of a collection of communication antipatterns that arise in technical communication under time pressure. Available here and by RSS on April 24.
A dangerous curve in an icy roadAnd on May 1: Antipatterns for Time-Constrained Communication: 2
Recognizing just a few patterns that can lead to miscommunication can reduce the incidence of problems. Here is Part 2 of a collection of antipatterns that arise in technical communication under time pressure, emphasizing those that depend on content. Available here and by RSS on May 1.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.