Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 3;   January 26, 2022: Cyber Rumors in Organizations

Cyber Rumors in Organizations


Rumor management practices in organizations haven't kept up with rumor propagation technology. Rumors that propagate by digital means — cyber rumors — have longer lifetimes, spread faster, are more credible, and are better able to reinforce each other.
The iconic image of cyber code, as popularized in the film The Matrix

The iconic image of cyber code, as popularized in the film The Matrix.

Rumors in organizations can be expensive. Because they limit the ability of the organization to unite to achieve shared goals, rumors complicate the task of managing the organization. Unfortunately, much of what we believe about managing rumors predates the arrivals of digital communication and social media. And those outdated beliefs about rumors add to the difficulty of managing cyber rumors in organizations.

For example, consider one phrase we often use in connection with discussions of rumors: word of mouth. When we use a mental model of rumor propagation based on word-of-mouth transmission, we're limiting our considerations to synchronous, face-to-face transmission. That is, we're biasing our thinking by limiting it to actual person-to-person conversation. While that does happen in modern organizations, face-to-face conversation comprises a declining portion of all exchanges between people. And that bias leads to rumor control strategies that are less effective than they might be if they had been developed unencumbered by a bias favoring face-to-face communication.

Rumors tell you either what people hope might be true, or what they fear might be true, or what their biases tell them is true. Rumors are useful if that's what you want to know. But if what you want to know is truth about anything else, rumors can be misleading. They can mislead entire organizations, despite the most energetic attempts by Management to limit the impact of rumors.

This Rumors tell you either what people hope
might be true, or what they fear might be
true, or what their biases tell them is true
post is an attempt to balance the conversation about rumor management by drawing attention to the differences between cyber rumor propagation and pre-cyber rumor propagation. Here are three important differences.

Cyber rumors have longer lifetimes
For pre-cyber rumors the transmission medium was voice or print. If by voice, rumors could propagate in person or by telephone. If by print, rumors could propagate in hardcopy by mail or by hand exchange. Both means of transfer, which still operate, have limited lifetimes. The pre-cyber voice channel was clearly time limited. Hardcopy was more durable, but hardcopy could be discarded, mislaid, buried under other hardcopy, or filed. Unless people took intentional steps to preserve or duplicate hardcopy, it was unlikely to propagate far.
By contrast, cyber-rumors are far more durable. Voice can be recorded. Even video can be recorded. Email or text messages can be duplicated readily. Even if filed, search tools can recover email or text quickly. Widespread access to image search is already available. Access to video and voice search is no doubt just over the horizon.
Cyber rumors propagate more rapidly
Pre-cyber rumors that propagated most rapidly probably exploited the telephone. So let's compare rumor propagation speed for the era before the smartphone (pre-Blackberry) to the propagation speed for the smartphone era. The most significant rate limiter for this channel is access to the telephone. In the pre-smartphone era, access to the telephone was limited to the time the user was actually in-office. Given the patterns of meetings and travel, it's fair to assume that many users spent less than 50% of their days in reach of their telephones. This pattern is probably one factor that drove development of answering systems. In the pre-smartphone era, then, a rumor could pass from one person to the next by telephone in one call for only about 50% of the business day. That fraction could increase a bit if the transmitter felt comfortable enough to leave a record of the rumor in voicemail.
But in the smartphone era, people have access to their phones more than 100% of the business day. Access is greater than 100% because people converse after hours. Moreover, because smartphones also support email, Web, and text channels, smartphones also accelerate rumor propagation velocities for text-based channels. Velocities are now so high that passive rumor monitoring ("I can act to suppress a rumor only if I hear about it somehow") is of little value as a rumor management system component.
Cyber rumors have higher R0
Models of disease contagion use a parameter R0 (pronounced R-naught) to represent the number of people to whom an infected person can transmit the disease. Rumors aren't disease, but we can model their spread using similar mathematics. Specifically, in most cases, the R0 of cyber rumors is higher than the R0 of pre-cyber rumors for two reasons.
First, cyber rumors replicate more readily because they exist in a medium that supports replication. Indeed, the act of transmitting a cyber rumor is almost certainly an act of replication. By contrast, for the case of voice transmission, for example, replication of a pre-cyber rumor requires that one person repeat it aloud to others. Or if the rumor exists in hardcopy, one person must hand it to another, or fire up a photocopier and distribute the copies.
Second, cyber rumors have longer lifetimes. The transmission process can take place essentially forever, as long as someone can find and read a copy of the rumor. By contrast, per-cyber rumors can propagate only as long as someone is willing to repeat them or distribute them. It is this property of cyber rumors that may be the basis of optimistic projections for future prospects of the online segment of the reputation management industry.
The result of these seemingly minor differences between cyber rumors and pre-cyber rumors is dramatic. Cyber rumors not only propagate much faster, but their rate of spread is so great that early detection and debunking of cyber rumors must be the focus of any rumor management program. Even more important is information security. Those who are "in the know" about subjects that might be related to possible rumors must take great care not to say or do anything that might be fuel for rumors.
Cyber rumors propagate more faithfully
Because cyber rumors replicate by digital means, they're more likely to be faithful copies of what the person passing them along actually received. People do embellish, but in organizations most of the embellishment happens early in the replication chain.
By contrast, pre-cyber rumors tend to evolve more readily as they propagate, especially if they propagate by voice. The temptation to embellish can be irresistible.
But even if cyber rumors didn't propagate more faithfully, recipients regard cyber rumors as more credible than pre-cyber rumors. Cyber rumors are more likely to appear in writing — email, text messages, or in Web pages (internal or world-facing). And these media, deservedly or not, are generally more credible than is the person who repeats what he or she heard from another person.

Most important, cyber rumors are better able to reinforce each other. Because people have better access to the full array of extant cyber rumors, they're able to create patterns — commonly called conspiracy theories — that tie the rumors together into a plausible framework that makes the individual component cyber rumors more credible. When this happens, the issue is no longer rumor management. It's damage control. Go to top Top  Next issue: The Risk of Astonishing Success  Next Issue

52 Tips for Leaders of Project-Oriented OrganizationsAre your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

President George W. Bush of the United States and Crown Prince Abdullah of Saudi ArabiaSocial Transactions: We're Doing It My Way
We have choices about how we conduct social transactions — greetings, partings, opening doors, and so on. Some transactions require that we collaborate with others. In social transactions, how do we decide whose preferences rule?
Todd Park, United States Chief Technology OfficerProjects as Proxy Targets: II
Most projects have both supporters and detractors. When a project has been approved and execution begins, some detractors don't give up. Here's Part II of a catalog of tactics detractors use to sow chaos.
A rescue puppyYou Can't Control What Other People Think
Ever think that the world would be a much better place if you could control what other people think? Maybe it would be. And maybe not...
Desperation at workReframing Revision Resentment: I
From time to time, we're required to revise something previously produced — some copy, remarks, an announcement, code, the Mona Lisa, whatever… When we do, some of us experience frustration, and view the assignment as an onerous chore. Here are some alternative perspectives that might ease the burden.
A horserace, which is a useful metaphor for the abuser's view of a conversationExploitation and Conversational Narcissism at Work: I
Exploitation of others is one of four themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are five examples that emphasize exploitation of others.

See also Workplace Politics and Organizational Change for more related articles.

Forthcoming issues of Point Lookout

The Leonard P. Zakim Bunker Hill BridgeComing May 29: Rescheduling: Project Factors
Rescheduling is what we do when we can no longer honor the schedule we have now. Of all causes of rescheduling, the more controllable are those found at the project level. Attending to them in one project can limit their effects on other projects. Available here and by RSS on May 29.
A switch in the tracks of a city tramwayAnd on June 5: The Reactive Rescheduling Cycle
When the current schedule is no longer viable, we reschedule. But rescheduling is unlike devising a schedule before work has begun. People know that we're "behind" and taking time to reschedule only makes things worse. Political pressure doesn't help. Available here and by RSS on June 5.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrendPtoGuFOkTSMQOzxner@ChacEgGqaylUnkmwIkkwoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.