Because most of the problems we call knowledge work are too big for a single individual to address alone, knowledge work entails frequent interaction with others. And many of those interactions consist of commenting on the work of others. When those comments stray from factual observations about the content of the work into subjective observations about the worth of the worker, it becomes clear to all that Trouble has arrived. But often, Trouble arrived long before Trouble's arrival became clear to all. There is a preliminary stage, when commentary is still focused on the work, but when commentary is expressed with gratuitous harshness. That is an indicator that Trouble has arrived.
An example can provide clarity.
Jaime has just reported a discovery he made about why the system failed to recognize plastic shopping bags being blown across the vehicle's travel path. Hector, his supervisor, comments, "Yes, we all knew that. Glad you're catching up finally."
One can question The choice to tolerate gratuitous harshness
in a group's culture is an expensive one indeedthe value of Hector's offering that Jaime's information was already known. But that isn't the real problem with Hector's comment. Whether or not "we all knew" what Jaime just reported, Hector was needlessly condescending. The condescension is needless because it doesn't help the team achieve its objective; rather, it's a hindrance.
The choice to tolerate gratuitous harshness in a group's culture is an expensive one indeed. What follows is a survey of processes that contribute to the high cost of gratuitous harshness.
- Gratuitous harshness reduces initiative
- If offering something novel and valuable entails a risk of being subjected to gratuitously harsh commentary, many naturally concern themselves with managing that risk. Perhaps the most obvious approach is to limit one's contributions. Such limitation reduces the risk of experiencing the abuse, but the cost to the organization is high. The cost to the contributor is also high, but if the abuse has been severe enough the calculation many people make favors avoiding the risk of abuse.
- Other forms of risk management are also common. For example, offering one's contributions privately to the abuser might seem to mitigate the risk of public humiliation. But the abuser always has the option of subsequently describing the contribution in a public setting and commenting abusively about it there. Another popular ploy: the target might partner with someone who seems protected from abuse. But in response the abuser can publicly praise the partner while omitting all mention of the target.
- Talented people tend to have good ideas
- Reducing the likelihood of contributions is expensive. Targets still have ideas and still generate contributions, but they're less likely to express them in ways that draw the attention of the abuser. Some targets adopt "guerilla" tactics — offering contributions in secret or private channels, hoping to escape becoming targets. Others just withhold. The overall flow is constricted.
- The net result is a reduction in the rate of improvement, which creates a gap between what's possible and what actually occurs. That gap has a computable monetary value, which is almost certainly negative.
- Word of mouth can be both damaging and helpful
- The negative effects of gratuitous harshness can affect more people than just the immediate target whether news of the event propagates in the organization by word of mouth or by cyber rumor. If the tale matches previous tales, or if it matches the image of the abuser, the tale will spread, however inaccurate may be that tale or that image.
- Trying to halt its spread to limit the tale's consequences is a fool's errand. Instead of limiting the spread of deleterious tales, abusers would do well to avoid engaging in any further abuse. Instead, they should concentrate on creating tales that enhance initiative, creativity, and innovation.
- Witnesses are like surcharges
- Delivering gratuitously harsh comments in the presence of witnesses raises the cost to the organization, for two reasons. First, witnesses can experience the effects of the harsh comments, to some extent, as if they were themselves the target. Second, the witnesses can (and do) confirm accounts of what actually happened. Targets do sometimes convey tales of what occurred, but the people they talk to tend to discount the truth of the tales because they see tales told by the target as self-serving. Because confirmation by witnesses reduces the discount dramatically, witnesses are like surcharges.
- Witnesses need not be present for the event if the gratuitous harshness is delivered by email or text message. In that case the target can pass the message around, thereby creating witnesses. And of course there can be e-witnesses if anyone other than the target received the offending message.
Most important, expressing your thoughts in a gratuitously harsh manner can be thrilling, because it's a way of demonstrating your situational or organizational power. Because that thrill can be addictive, gratuitous harshness can become a habit. If that happens, your career is at risk. And if you suspect that someone in your work is using gratuitous harshness habitually, you will eventually be targeted, if you haven't yet been. Fix it if you can — or move on. Top Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
Your comments are welcomeWould you like to see your comments posted here? rbrenZLkFdSHmlHvCaSsuner@ChacbnsTPttsdDaRAswloCanyon.comSend me your comments by email, or by Web form.
About Point Lookout
Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
More articles on Workplace Bullying:
- How Workplace Bullies Use OODA: I
- Workplace bullies who succeed in carrying on their activities over a long period of time rely on more
than mere intimidation to escape prosecution. They proactively shape their environments to make them
safe for bullying. The OODA model gives us insights into how they accomplish this.
- When the Chair Is a Bully: III
- When the chair of the meeting is so dominant that attendees withhold comments or slant contributions
to please the chair, meeting output is at risk of corruption. Because chairs usually can retaliate against
attendees who aren't "cooperative," this problem is difficult to address. Here's Part III
of our exploration of the problem of bully chairs.
- Dealing with Rapid-Fire Attacks
- When a questioner repeatedly attacks someone within seconds of their starting to reply, complaining
to management about a pattern of abuse can work — if management understands abuse, and if management
wants deal with it. What if management is no help?
- What Micromanaging Is and Isn't
- Micromanaging is a dysfunctional pattern of management behavior, involving interference in the work
others are supposedly doing. Confusion about what it is and what it isn't makes effective response difficult.
- Overt Verbal Abuse at Work
- Verbal abuse in the workplace involves using written or spoken language to disparage, to disadvantage,
or to otherwise harm others. Perpetrators tend to favor tactics that they can subsequently deny having
used to harm anyone.
Forthcoming issues of Point Lookout
- Coming November 30: Avoiding Speed Bumps: II
- Many of the difficulties we encounter when working together don't create long-term harm, but they do cause delays, confusion, and frustration. Here's Part II of a little catalog of tactics for avoiding speed bumps. Available here and by RSS on November 30.
- And on December 7: Reaching Agreements in Technological Contexts
- Reaching consensus in technological contexts presents special challenges. Problems can arise from interactions between the technological elements of the issue at hand, and the social dynamics of the group addressing that issue. Here are three examples. Available here and by RSS on December 7.
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenZLkFdSHmlHvCaSsuner@ChacbnsTPttsdDaRAswloCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info