Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 21, Issue 46;   November 17, 2021: When You Feel Attacked

When You Feel Attacked

by

Verbal attacks might be upsetting, but in creative conflicts they're usually permissible if related to substantive matters. When verbal attacks are personal, they can be unfair and illegitimate. The ability to recenter yourself quickly is invaluable.
Horseshoe Lake in Shaker Heights, Ohio

Horseshoe Lake in Shaker Heights, Ohio, a picture of tranquility. One aid in maintaining composure under fire is memory of a tranquil scene.

Conflict — constructive, destructive, or both at once — sometimes leads to painful personal attacks by one party on another. And the pain of personal attacks can compromise our ability to respond effectively. In such circumstances, when we feel attacked personally, formulating and executing effective responses requires the ability to first recover our thinking powers. Seeing the attack from a perspective different from the personal one can provide that ability.

Some attacks are indeed motivated only by a desire to inflict psychic pain. But recognizing that some attackers have other motivations can help find a perspective that is a sound basis for effective response. To find that perspective, begin by recognizing that the attack might not be what it seems. It is for these other kinds of personal attacks that this post can provide tools. Below are four forms of personal attacks that are driven by motives more complex than simple infliction of psychic pain.

Maybe the attack is actually a counterattack
Even if you haven't attacked anyone, your attacker's perception might be that you have attacked either your attacker, or possibly someone else. Because your perception is that you haven't attacked anyone, you probably experience the attack on you as unprovoked. But your attacker sees things differently.
Untangling Some attacks are indeed motivated only
by a desire to inflict psychic pain, but there
are many other possible motivations
this confusion can be difficult, because the difference in perceptions interferes with the communication necessary for aligning the perceptions. A third party can be helpful and necessary.
Maybe you aren't the ultimate target
Although the attacker might be attacking your position or your person, the real target might be someone or something else — your supervisor or mentor, or one of your subordinates, or one of your initiatives, or some other initiative that depends on your support.
Before you counterattack the attacker, consider carefully what your attacker's objective might be. If you aren't the ultimate target, consider forming an alliance with whomever or whatever might be the ultimate target.
Maybe the attack is only a demonstration
Your attacker might not be trying to discredit you or your position. Rather, the attack might be intended to cause you to adjust or abandon your position voluntarily, by demonstrating what the attacker might know or might do if you don't do as the attacker desires. The intended audience of the demonstration might be you, or it might be someone else.
Understanding the attacker's objective might require that you determine the identity of the demonstration's intended audience. An alliance with the members of that audience can prove powerful.
Maybe the attacker is a proxy
Some attackers are acting as proxies for people who might not be directly involved in the conflict. These outside parties have an interest in weakening the target, or detaching the target from the target's current position. To convince the attacker to engage, the outside party might be employing incentives or disincentives.
If the attacker is responding to incentives or disincentives from an outside party, knowledge of the nature of those inducements can be helpful in devising a response. Greater incentives or more severe disincentives might be sufficient to alter the attacker's behavior.

These are only examples of alternative explanations for the attack. The theme that unites all these examples is that the attack might not be what it seems to be, and if it is, the attacker might not be motivated by animus toward you. If you can keep that thought in mind as the attack unfolds, you're more likely to gain insight into what's really happening. That insight can help you remain centered and find a way to respond effectively. Go to top Top  Next issue: Three Levels of Deception at Work  Next Issue

101 Tips for Managing Conflict Are you fed up with tense, explosive meetings? Are you or a colleague the target of a bully? Destructive conflict can ruin organizations. But if we believe that all conflict is destructive, and that we can somehow eliminate conflict, or that conflict is an enemy of productivity, then we're in conflict with Conflict itself. Read 101 Tips for Managing Conflict to learn how to make peace with conflict and make it an organizational asset. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Conflict Management:

Accretion Spins Pulsar to Millisecond RangeBemused Detachment
Much of the difficulty between people at work is avoidable if only we can find ways to slow down our responses to each other. When we hurry, we react without thinking. Here's a suggestion for increasing comity by slowing down.
A gray wolf. Animosity between wolves helps ensure balance.Animosity Patterns
Animosity between two people at work is often attributed to "personality clashes." While sometimes people can't get along, animosity can also be a tool for accomplishing strictly political ends. Here's a short catalog of some of its uses.
Linda Tripp, a central figure in the impeachment of President ClintonPumpers
In workplace politics, some people always seem to be seeking information about others, but they give very little in return. They're pumpers. What can you do to deal with pumpers?
Allied leaders at the Yalta Conference in February, 1945Devious Political Tactics: More from the Field Manual
Careful observation of workplace politics reveals an assortment of devious tactics that the ruthless use to gain advantage. Here are some of their techniques, with suggestions for effective responses.
The signing of the Paris Peace AccordsMeta-Debate at Work
Workplace discussions sometimes take the form of informal debate, in which parties who initially have different perspectives try to arrive at a shared perspective. Meta-debate is one way things can go wrong.

See also Conflict Management and Conflict Management for more related articles.

Forthcoming issues of Point Lookout

A game of Jenga underwayComing September 4: Beating the Layoffs: I
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily before the layoffs can carry significant advantages. Here are some that relate to self-esteem, financial anxiety, and future employment. Available here and by RSS on September 4.
A child at a fork in a pathAnd on September 11: Beating the Layoffs: II
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily can carry advantages. Here are some advantages that relate to collegial relationships, future interviews, health, and severance packages. Available here and by RSS on September 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.