![Horseshoe Lake in Shaker Heights, Ohio Horseshoe Lake in Shaker Heights, Ohio](../images/horseshoe-lake.png)
Horseshoe Lake in Shaker Heights, Ohio, a picture of tranquility. One aid in maintaining composure under fire is memory of a tranquil scene.
Conflict — constructive, destructive, or both at once — sometimes leads to painful personal attacks by one party on another. And the pain of personal attacks can compromise our ability to respond effectively. In such circumstances, when we feel attacked personally, formulating and executing effective responses requires the ability to first recover our thinking powers. Seeing the attack from a perspective different from the personal one can provide that ability.
Some attacks are indeed motivated only by a desire to inflict psychic pain. But recognizing that some attackers have other motivations can help find a perspective that is a sound basis for effective response. To find that perspective, begin by recognizing that the attack might not be what it seems. It is for these other kinds of personal attacks that this post can provide tools. Below are four forms of personal attacks that are driven by motives more complex than simple infliction of psychic pain.
- Maybe the attack is actually a counterattack
- Even if you haven't attacked anyone, your attacker's perception might be that you have attacked either your attacker, or possibly someone else. Because your perception is that you haven't attacked anyone, you probably experience the attack on you as unprovoked. But your attacker sees things differently.
- Untangling Some attacks are indeed motivated only
by a desire to inflict psychic pain, but there
are many other possible motivationsthis confusion can be difficult, because the difference in perceptions interferes with the communication necessary for aligning the perceptions. A third party can be helpful and necessary. - Maybe you aren't the ultimate target
- Although the attacker might be attacking your position or your person, the real target might be someone or something else — your supervisor or mentor, or one of your subordinates, or one of your initiatives, or some other initiative that depends on your support.
- Before you counterattack the attacker, consider carefully what your attacker's objective might be. If you aren't the ultimate target, consider forming an alliance with whomever or whatever might be the ultimate target.
- Maybe the attack is only a demonstration
- Your attacker might not be trying to discredit you or your position. Rather, the attack might be intended to cause you to adjust or abandon your position voluntarily, by demonstrating what the attacker might know or might do if you don't do as the attacker desires. The intended audience of the demonstration might be you, or it might be someone else.
- Understanding the attacker's objective might require that you determine the identity of the demonstration's intended audience. An alliance with the members of that audience can prove powerful.
- Maybe the attacker is a proxy
- Some attackers are acting as proxies for people who might not be directly involved in the conflict. These outside parties have an interest in weakening the target, or detaching the target from the target's current position. To convince the attacker to engage, the outside party might be employing incentives or disincentives.
- If the attacker is responding to incentives or disincentives from an outside party, knowledge of the nature of those inducements can be helpful in devising a response. Greater incentives or more severe disincentives might be sufficient to alter the attacker's behavior.
These are only examples of alternative explanations for the attack. The theme that unites all these examples is that the attack might not be what it seems to be, and if it is, the attacker might not be motivated by animus toward you. If you can keep that thought in mind as the attack unfolds, you're more likely to gain insight into what's really happening. That insight can help you remain centered and find a way to respond effectively. Top
Next Issue
Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!
Your comments are welcome
Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Conflict Management:
Untangling Tangled Threads
- In energetic discussions, topics and subtopics get intertwined. The tangles can be frustrating. Here's
a collection of techniques for minimizing tangles in complex discussions.
Indicators of Lock-In: I
- In group decision making, lock-in occurs when the group persists in adhering to its chosen course even
though superior alternatives exist. Lock-in can be disastrous for problem-solving organizations. What
are some common indicators of lock-in?
How Workplace Bullies Use OODA: I
- Workplace bullies who succeed in carrying on their activities over a long period of time rely on more
than mere intimidation to escape prosecution. They proactively shape their environments to make them
safe for bullying. The OODA model gives us insights into how they accomplish this.
Strategy for Targets of Verbal Abuse
- Many targets of verbal abuse at work believe that they have just two strategic options: find a new job,
or accept the abuse. In some cases, they're correct. But not always.
Attributes of Joint Leadership Teams
- The leadership of most teams, business units, or enterprises consists of a single individual. Others
have joint leadership teams. What kinds of joint leadership teams are there, and what factors can affect
their success?
See also Conflict Management and Effective Communication at Work for more related articles.
Forthcoming issues of Point Lookout
Coming July 3: Additive bias…or Not: II
- Additive bias is a cognitive bias that many believe contributes to bloat of commercial products. When we change products to make them more capable, additive bias might not play a role, because economic considerations sometimes favor additive approaches. Available here and by RSS on July 3.
And on July 10: On Delegating Accountability: I
- As the saying goes, "You can't delegate your own accountability." Despite wide knowledge of this aphorism, people try it from time to time, especially when overcome by the temptation of a high-risk decision. What can you delegate, and how can you do it? Available here and by RSS on July 10.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick
![Send email or subscribe to one of my newsletters](../images/social-icons/email-32.png)
![Follow me at LinkedIn](../images/social-icons/linkedin-reg-32.png)
![Follow me at X, or share a post](../images/social-icons/x-32.png)
![Subscribe to RSS feeds](../images/social-icons/feed-icon-32.png)
![Subscribe to RSS feeds](../images/social-icons/facebook-icon-32.png)
Recommend this issue to a friend
Send an email message to a friend
rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
![Technical Debt for Policymakers Blog](../images/logos/techdebtpolicy-logo-sm-1.png)