Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 22, Issue 24;   June 22, 2022: Double Binds at Work

Double Binds at Work

by

At work, a double bind arises when someone in authority makes contradictory demands of a subordinate, who has no alternative but to choose among options that all lead to unwelcome results. Double binds are far more common than most of us realize.
A figure-eight loop, also known as a Flemish Loop

A figure-eight loop, also known as a Flemish Loop. It is used in climbing and caving, but not much used at sea, because it is difficult to untie after loading, when wet. In that respect, it has much in common with the double bind, which is by design difficult to escape. Image by SilberFuchs courtesy Pixabay.com.

In "lessons learned" sessions — also known as retrospectives — the need for psychological safety is widely understood. [Kerth 2001] Most of us recognize that the value of the session is greatly enhanced if people feel confident that there will be no retaliation for raising issues that illustrate the need for improvement in the group's process. No retaliation during the session, and no retaliation after it, especially in the context of employee performance evaluation.

But as it turns out, the need for psychological safety relative to lessons learned has a much broader scope. A fictitious case might clarify the issue.

Eileen is an IT director for Pan-Arctic Cruise Lines. Last year at about this time, Eileen led the effort to upgrade the MegaSoft operating system on all of PACL's shipboard desktop and mobile devices. It was an especially tricky operation because of the difficulties associated with interactions between crossing the International Date Line multiple times in a day, and deciding which time zone was applicable at various spots in the Arctic Ocean. Eileen has just heard that Antonio, the upgrade lead this year's upgrade, is about to replicate some of Eileen's more frustrating blunders. But she's concerned about contacting Antonio to offer advice, for fear that he might take offense.

Eileen's problem is actually even more complex. If she offers advice unbidden, she might offend Antonio. But if she says nothing, and Antonio replicates her mistakes, she might be faulted for not warning him. And there's no way out for Eileen, because the upgrade effort won't be cancelled. Eileen's situation is what psychologists call a double bind.

Characteristics of double binds

The double bind was first identified by Gregory Bateson, et al., as a model for causes of schizophrenia. [Bateson 1956] They define a double bind as much more than a no-win situation. A no-win situation is one in which all choices have unwelcome consequences. By contrast, a double bind is more complex:

  • It involves two or more people. One is the Subject of the double bind. Bateson et al. use the term victim. The second person, the Authority, is someone in authority whom the Subject respects. The Authority might be a composite of several people.
  • The double bind is a repeated pattern. It can't be resolved as a single experience.
  • It has a primary demand of the form "Do X or else Y". This demand can also appear as a prohibition: "Don't do X or else Y." And it can be paradoxical, consisting of a choice between two unwelcome outcomes.
  • There is a conflicting secondary demand, not necessarily expressed explicitly. This secondary demand often constrains the subject's perceptions: "Don't see this as punishment."
  • There is no escape. The subject is required to choose among the options.

Eileen is in One of the problems of dealing with
double binds as a Subject is the
difficulty of recognizing them
a double bind. The Authority is her supervisor, who she expects will hear about whatever she does or doesn't do relative to warning or advising Antonio. Her choices both lead to unwelcome results, in that they could reflect on assessments of her ability to work with colleagues. Since that assessment could be part of a performance evaluation, this situation is part of a pattern.

Dealing with double binds at work

One of the problems of dealing with double binds as a Subject is the difficulty of recognizing them. For example, the threat in the form "Do X or else Y" is rarely explicit at work. The performance management system, with its coarse-grained rating scale, hangs over everything. At the executive level, the performance management system takes a different form (largely financial) but it is just as powerful.

The effectiveness of performance management as the "or else Y" component of the double bind is determined by the person or persons who apply it — usually the "supervisor." It is therefore, usually, the supervisor who sets up the double bind. As a supervisor yourself, you're more likely to notice double binds affecting the behavior of your subordinates than you are to recognize their affects on yourself.

Last words

One of the less visible elements of the double bind structure at work relates to depriving the Subject of the ability to escape. That element is often implemented using employee stock option plans. By holding out the possibility of a large financial windfall, the ESOP suppresses the willingness of employees to escape any double binds that affect them. Ironically, the organization itself doesn't provide the financial resources this scheme requires. Those resources come from the shareholders in the form of dilution. Go to top Top  Next issue: Formulaic Utterances: III  Next Issue

How to Spot a Troubled Project Before the Trouble StartsProjects never go quite as planned. We expect that, but we don't expect disaster. How can we get better at spotting disaster when there's still time to prevent it? How to Spot a Troubled Project Before the Trouble Starts is filled with tips for executives, senior managers, managers of project managers, and sponsors of projects in project-oriented organizations. It helps readers learn the subtle cues that indicate that a project is at risk for wreckage in time to do something about it. It's an ebook, but it's about 15% larger than "Who Moved My Cheese?" Just . Order Now! .

Footnotes

[Kerth 2001]
Norman L. Kerth. Project Retrospectives: A Handbook for Team Reviews. New York: Dorset House, 2001. Order from Amazon.com. Back
[Bateson 1956]
Gregory Bateson, Don D. Jackson, Jay Haley, and John Weakland. "Toward a theory of schizophrenia." Behavioral Science 1:4 (1956), 251-264. Available here. Retrieved 5 June 2022. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenZLkFdSHmlHvCaSsuner@ChacbnsTPttsdDaRAswloCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Workplace Bullying:

Too much time on his handsHurtful Clichés: II
Much of our day-to-day conversation consists of harmless clichés: "How goes it?" or "Nice to meet you." Some other clichés aren't harmless, but they're so common that we use them without thinking. Here's Part II of a series exploring some of these clichés.
A U.S. Marine sniper wearing sniper camouflage gear known as a "ghillie" suitHow Targets of Bullies Can Use OODA: II
To make the bullying stop, many targets of bullies try to defend themselves. But defense alone is not sufficient — someone must make the bully stop. That's why counterattack is much more likely to work.
The Town Hall of Brighton, England, in 2010Social Isolation and Workplace Bullying
Social isolation is a tactic widely used by workplace bullies. What is it? How do bullies use it? Why do bullies use it? What can targets do about it?
Gen. Robert E. Lee's traveling chess setSo You Want the Bullying to End: II
If you're the target of a workplace bully, ending the bullying can be an elusive goal. Here are some guidelines for tactics to bring it to a close.
Three gulls excluding a fourthUnrecognized Bullying: I
Much workplace bullying goes unrecognized. Three reasons: (a) conventional definitions of bullying exclude much actual bullying; (b) perpetrators cleverly evade detection; and (c) cognitive biases skew our perceptions so we don't see some bullying as bullying.

See also Workplace Bullying and Critical Thinking at Work for more related articles.

Forthcoming issues of Point Lookout

Tuckman's stages of group developmentComing December 7: Reaching Agreements in Technological Contexts
Reaching consensus in technological contexts presents special challenges. Problems can arise from interactions between the technological elements of the issue at hand, and the social dynamics of the group addressing that issue. Here are three examples. Available here and by RSS on December 7.
An actual straw manAnd on December 14: Straw Man Variants
The straw man fallacy is a famous rhetorical fallacy. Using it distorts debate and can lead groups to reach faulty conclusions. It's ad readily recognized, but it has some variants that are more difficult to spot. When unnoticed, trouble looms. Available here and by RSS on December 14.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenZLkFdSHmlHvCaSsuner@ChacbnsTPttsdDaRAswloCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.