Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 3;   January 26, 2022: Cyber Rumors in Organizations

Cyber Rumors in Organizations

by

Rumor management practices in organizations haven't kept up with rumor propagation technology. Rumors that propagate by digital means — cyber rumors — have longer lifetimes, spread faster, are more credible, and are better able to reinforce each other.
The iconic image of cyber code, as popularized in the film "The Matrix"

The iconic image of cyber code, as popularized in the film The Matrix.

Rumors in organizations can be expensive. Because they limit the ability of the organization to unite to achieve shared goals, rumors complicate the task of managing the organization. Unfortunately, much of what we believe about managing rumors predates the arrivals of digital communication and social media. And those outdated beliefs about rumors add to the difficulty of managing cyber rumors in organizations.

For example, consider one phrase we often use in connection with discussions of rumors: word of mouth. When we use a mental model of rumor propagation based on word-of-mouth transmission, we're limiting our considerations to synchronous, face-to-face transmission. That is, we're biasing our thinking by limiting it to actual person-to-person conversation. While that does happen in modern organizations, face-to-face conversation comprises a declining portion of all exchanges between people. And that bias leads to rumor control strategies that are less effective than they might be if they had been developed unencumbered by a bias favoring face-to-face communication.

Rumors tell you either what people hope might be true, or what they fear might be true, or what their biases tell them is true. Rumors are useful if that's what you want to know. But if what you want to know is truth about anything else, rumors can be misleading. They can mislead entire organizations, despite the most energetic attempts by Management to limit the impact of rumors.

This Rumors tell you either what people hope
might be true, or what they fear might be
true, or what their biases tell them is true
post is an attempt to balance the conversation about rumor management by drawing attention to the differences between cyber rumor propagation and pre-cyber rumor propagation. Here are three important differences.

Cyber rumors have longer lifetimes
For pre-cyber rumors the transmission medium was voice or print. If by voice, rumors could propagate in person or by telephone. If by print, rumors could propagate in hardcopy by mail or by hand exchange. Both means of transfer, which still operate, have limited lifetimes. The pre-cyber voice channel was clearly time limited. Hardcopy was more durable, but hardcopy could be discarded, mislaid, buried under other hardcopy, or filed. Unless people took intentional steps to preserve or duplicate hardcopy, it was unlikely to propagate far.
By contrast, cyber-rumors are far more durable. Voice can be recorded. Even video can be recorded. Email or text messages can be duplicated readily. Even if filed, search tools can recover email or text quickly. Widespread access to image search is already available. Access to video and voice search is no doubt just over the horizon.
Cyber rumors propagate more rapidly
Pre-cyber rumors that propagated most rapidly probably exploited the telephone. So let's compare rumor propagation speed for the era before the smartphone (pre-Blackberry) to the propagation speed for the smartphone era. The most significant rate limiter for this channel is access to the telephone. In the pre-smartphone era, access to the telephone was limited to the time the user was actually in-office. Given the patterns of meetings and travel, it's fair to assume that many users spent less than 50% of their days in reach of their telephones. This pattern is probably one factor that drove development of answering systems. In the pre-smartphone era, then, a rumor could pass from one person to the next by telephone in one call for only about 50% of the business day. That fraction could increase a bit if the transmitter felt comfortable enough to leave a record of the rumor in voicemail.
But in the smartphone era, people have access to their phones more than 100% of the business day. Access is greater than 100% because people converse after hours. Moreover, because smartphones also support email, Web, and text channels, smartphones also accelerate rumor propagation velocities for text-based channels. Velocities are now so high that passive rumor monitoring ("I can act to suppress a rumor only if I hear about it somehow") is of little value as a rumor management system component.
Cyber rumors have higher R0
Models of disease contagion use a parameter R0 (pronounced R-naught) to represent the number of people to whom an infected person can transmit the disease. Rumors aren't disease, but we can model their spread using similar mathematics. Specifically, in most cases, the R0 of cyber rumors is higher than the R0 of pre-cyber rumors for two reasons.
First, cyber rumors replicate more readily because they exist in a medium that supports replication. Indeed, the act of transmitting a cyber rumor is almost certainly an act of replication. By contrast, for the case of voice transmission, for example, replication of a pre-cyber rumor requires that one person repeat it aloud to others. Or if the rumor exists in hardcopy, one person must hand it to another, or fire up a photocopier and distribute the copies.
Second, cyber rumors have longer lifetimes. The transmission process can take place essentially forever, as long as someone can find and read a copy of the rumor. By contrast, per-cyber rumors can propagate only as long as someone is willing to repeat them or distribute them. It is this property of cyber rumors that may be the basis of optimistic projections for future prospects of the online segment of the reputation management industry.
The result of these seemingly minor differences between cyber rumors and pre-cyber rumors is dramatic. Cyber rumors not only propagate much faster, but their rate of spread is so great that early detection and debunking of cyber rumors must be the focus of any rumor management program. Even more important is information security. Those who are "in the know" about subjects that might be related to possible rumors must take great care not to say or do anything that might be fuel for rumors.
Cyber rumors propagate more faithfully
Because cyber rumors replicate by digital means, they're more likely to be faithful copies of what the person passing them along actually received. People do embellish, but in organizations most of the embellishment happens early in the replication chain.
By contrast, pre-cyber rumors tend to evolve more readily as they propagate, especially if they propagate by voice. The temptation to embellish can be irresistible.
But even if cyber rumors didn't propagate more faithfully, recipients regard cyber rumors as more credible than pre-cyber rumors. Cyber rumors are more likely to appear in writing — email, text messages, or in Web pages (internal or world-facing). And these media, deservedly or not, are generally more credible than is the person who repeats what he or she heard from another person.

Most important, cyber rumors are better able to reinforce each other. Because people have better access to the full array of extant cyber rumors, they're able to create patterns — commonly called conspiracy theories — that tie the rumors together into a plausible framework that makes the individual component cyber rumors more credible. When this happens, the issue is no longer rumor management. It's damage control. Go to top Top  Next issue: The Risk of Astonishing Success  Next Issue

52 Tips for Leaders of Project-Oriented OrganizationsAre your projects always (or almost always) late and over budget? Are your project teams plagued by turnover, burnout, and high defect rates? Turn your culture around. Read 52 Tips for Leaders of Project-Oriented Organizations, filled with tips and techniques for organizational leaders. Order Now!

Your comments are welcome

Would you like to see your comments posted here? rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Politics:

A 1940s-era trap fishing boatNasty Questions: II
In meetings, telemeetings, and email we sometimes ask questions that aren't intended to elicit information. Rather, they're indirect attacks intended to advance the questioner's political agenda. Here's part two of a catalog of some favorite tactics.
The 1991 eruption of Mount PinatuboManaging Pressure: Communications and Expectations
Pressed repeatedly for "status" reports, you might guess that they don't want status — they want progress. Things can get so nutty that responding to the status requests gets in the way of doing the job. How does this happen and what can you do about it? Here's Part I of a little catalog of tactics and strategies for dealing with pressure.
Col. John Boyd, U.S. Air Force, in a photo taken during his time as a fighter pilotOODA at Work
OODA is a model of decision making that's especially useful in rapidly evolving environments, such as combat, marketing, politics, and emergency management. Here's a brief overview.
A rescue puppyYou Can't Control What Other People Think
Ever think that the world would be a much better place if you could control what other people think? Maybe it would be. And maybe not...
A particularly complicated but well-ordered utility poleThe Utility Pole Anti-Pattern: II
Complex organizational processes can delay action. They can set people against one other and prevent organizations from achieving their objectives. In this Part II of our examination of these complexities, we look into what keeps processes complicated, and how to deal with them.

See also Workplace Politics and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

A game of Jenga underwayComing September 4: Beating the Layoffs: I
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily before the layoffs can carry significant advantages. Here are some that relate to self-esteem, financial anxiety, and future employment. Available here and by RSS on September 4.
A child at a fork in a pathAnd on September 11: Beating the Layoffs: II
If you work in an organization likely to conduct layoffs soon, keep in mind that exiting voluntarily can carry advantages. Here are some advantages that relate to collegial relationships, future interviews, health, and severance packages. Available here and by RSS on September 11.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenyrWpTxHuyCrjZbUpner@ChacnoFNuSyWlVzCaGfooCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at X, or share a post Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.