
An owl of undetermined species, possibly a Great Gray Owl. Its shape and coloring provide it with near-perfect camouflage, making it almost indistinguishable from the tree in which it's perched. So it is with bullying by proxy. The proxy arrangement makes the bullying activities of the primary bully difficult to detect, dramatically reducing the effectiveness of anti-bullying policies.
When we consider workplace bullying, the scenario that comes to mind most readily involves a perpetrator inflicting harm on a target. Compared to the target, the perpetrator usually has greater power, either socially or organizationally or both. The methods employed might be physically violent, but more often they are psychological. They involve tactics such as career damage, humiliation, isolation, threats, resource deprivation, undesirable assignments, or combinations thereof. Or worse.
When the bullying is recognized as bullying (sometimes it isn't), a common response is to wonder why the bully's supervisor lets it persist. Some targets and some witnesses actually intercede by reporting incidents to the bully's supervisor. Sadly, too often, their efforts are in vain. In some cases, the bully has actually bullied his or her own supervisor, who then dares not intervene. But that scenario is one for another post.
The cases of interest for this post and the next are those termed bullying by proxy. In bullying by proxy, the bully's supervisor leads the bully in a conspiracy in which the bully's supervisor plays a largely background role. In these cases, the person we usually regard as the bully is actually a proxy bully — one who bullies on behalf of another. The proxy bully's supervisor, the leader of the conspiracy, is the primary bully.
For clarity, let me define carefully what I mean by workplace bullying and workplace bullying by proxy. Then we can explore in some detail how the conspiracy forms. In the next post, I consider implications for designing and enforcing anti-bullying policies.
Defining bullying and bullying by proxy
- Bullying
- Workplace bullying is any aggressive behavior, associated with work, and primarily intended to cause physical or psychological harm to others. Workplace bullying need not occur in the workplace (it need not occur "on site"), though it can. It need not involve abuse of power, though it can. It need not be part of a repeated pattern, though it can be. It need not even cause physical or psychological harm to others, though it can. All that's required is that it be aggressive, associated with work, and that it be primarily intended to cause physical or psychological harm.
- This definition seems to be at odds with widely accepted definitions. For example, Einarsen, et al., state explicitly that, "…bullying is normally not about single and isolated events, but rather about behaviours that are repeatedly and persistently directed towards one or more employees." [Einarsen 2020] The widely accepted definitions require that the aggressive behavior be present in a persistent pattern, whereas the above definition has no such requirement. My own experience as a target, and the experiences of clients who have been targets, suggests that persistence of the aggressive behavior is not a defining factor. A single incident can permanently impress on the mind of the target the sense that another incident can occur at any moment.
- Moreover, most definitions of bullying focus on the target's perceptions rather than the perpetrator's intentions. The above definition focuses on the perpetrator's intentions, for two reasons. First, the perpetrator is likely to keep trying until the desired results are achieved. Second, even if the perpetrator fails, targets rarely fail to perceive the perpetrator's intentions. Perpetrator intentions are fundamental. They eventually lead to target's perceptions, which are derivative.
- From this perspective, the definition above coincides with the widely accepted definition of Einarsen, et al.
- Bullying by proxy
- In direct bullying — bullying in which there is no proxy — bully and target interact personally with no intermediary. Bullying by proxy differs from direct bullying in that two people conspire in the role of perpetrator. In the workplace form of bullying by proxy, one of the pair, the primary bully, is politically or socially more powerful than the other, who is the proxy bully. Usually, though not always, the primary bully is the supervisor of the proxy bully. The primary bully usually plays a background role in any observable incidents of bullying involving the target. The proxy bully is the one who engages the target in any exchanges observable by others.
- There are other terms that apply to bullying by proxy. Vicarious bullying or abetting bullying denote the bullying the primary bully engages in. The proxy bully is sometimes referred to as the secondary bully. [Hollis 2019] [Hollis 2017] I prefer the term proxy bully because a single primary bully might have several proxies.
How primary bullies and proxy bullies find each other
- Voluntary proxy bullies
- Some proxy bullies would seek out bullying opportunities of their own if their primary bullies hadn't recruited them. These voluntary proxy bullies are likely driven to bullying by the same compulsions that afflict non-proxy bullies. They are compelled to arrange to personally witness the suffering they cause. But as proxy bullies they have an additional motivation. They inflict harm on behalf of the primary bully so as to fulfill the primary bully's need to witness suffering. A common rationalization of this behavior is that the bullying serves as a tool to ensure that their business units meet performance goals. The idea that bullying enhances performance is controversial among researchers, but my unscientific personal observations suggest that it is regarded as a universal truth among those engaged in bullying by proxy.
- Some In bullying by proxy, the bully's supervisor
leads the bully in a conspiracy in which the
bully's supervisor plays a largely background roleindependent bullies realize that they can receive protected status if they work as a proxy bully for a primary bully. In these cases, it is often the proxy bully who recruits the primary bully. However, even in these cases, the superior power position of the primary ensures that the primary bully is in control. - Conscripted proxy bullies
- If the primary bully recruits the proxy bully, the situation is more complicated. Most often, when the proxy bully is conscripted, he or she has little choice but to accede to the demands of the primary bully. Examples:
- The primary bully coerces the proxy bully using a variety of bullying techniques to compel the proxy bully to abuse the target.
- The primary bully offers (sometimes implicitly) inducements to the candidate proxy bully, in the form of status, emblems of status, desirable assignments, favorable performance assessments, or financial compensation. These inducements become available only if the proxy bully engages the target using methods that satisfy the primary bully. Accompanying the inducements can be a suggestion, explicit or not, that if the candidate declines the "offer" to become a proxy bully, coercion will compel agreement.
- The primary bully subtly directs the proxy bully in ways that enable the primary bully to deny any role in the bullying.
Last words
In the next part of this exploration of bullying by proxy, I consider the fascinating ways in which this form of bullying complicates design and enforcement of anti-bullying policies and procedures. Next issue in this series
Top
Next Issue
Is a workplace bully targeting you? Do you know what to do to end the bullying? Workplace bullying is so widespread that a 2014 survey indicated that 27% of American workers have experienced bullying firsthand, that 21% have witnessed it, and that 72% are aware that bullying happens. Yet, there are few laws to protect workers from bullies, and bullying is not a crime in most jurisdictions. 101 Tips for Targets of Workplace Bullies is filled with the insights targets of bullying need to find a way to survive, and then to finally end the bullying. Also available at Apple's iTunes store! Just . Order Now!
Footnotes
Your comments are welcome
Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Workplace Bullying:
When You're the Target of a Bully
- Workplace bullies are probably the organization's most expensive employees. They reduce the effectiveness
not only of their targets, but also of bystanders and of the organization as a whole. What can you do
if you become a target?
Devious Political Tactics: Divide and Conquer: II
- While most leaders try to achieve organizational unity, some do use divisive tactics to maintain control,
or to elevate performance by fostering competition. Here's Part II of a series exploring the risks of
these tactics.
Look Where You Aren't Looking
- Being blindsided by an adverse event could indicate the event's sudden, unexpected development. It can
also indicate a failure to anticipate what could have been reasonably anticipated. How can we improve
our ability to prepare for adverse events?
Strategies of Verbal Abusers
- Verbal abuse at work has special properties, because it takes place in an environment in which verbal
abuse is supposedly proscribed. Yet verbal abuse does happen at work. Here are three strategies abusers
rely on to avoid disciplinary action.
Downscoping Under Pressure: II
- We sometimes "downscope" projects to bring them back on budget and schedule when they're headed
for overruns. Downscoping doesn't always work. Cognitive biases like the sunk cost effect and confirmation
bias can distort decisions about how to downscope.
See also Workplace Bullying and Workplace Bullying for more related articles.
Forthcoming issues of Point Lookout
Coming February 26: Devious Political Tactics: Bad Decisions
- When workplace politics influences the exchanges that lead to important organizational decisions, we sometimes make decisions for reasons other than the best interests of the organization. Recognizing these tactics can limit the risk of bad decisions. Available here and by RSS on February 26.
And on March 5: On Begging the Question
- Some of our most expensive wrong decisions have come about because we've tricked ourselves as we debated our options. The tricks sometimes arise from rhetorical fallacies that tangle our thinking. One of the trickiest is called Begging the Question. Available here and by RSS on March 5.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick





Recommend this issue to a friend
Send an email message to a friend
rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
