
Men in conversation at an event. Can you tell who's speaking and who's listening? Image by Henri Mathieu-Saint-Laurent, courtesy Pexels.com.
This exploration of conversational narcissism began last time with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.
The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with the abuser's sense of self-importance.
As explained last time, I use the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. And I described five ploys abusers use and which are associated with a sense of self-importance of the abuser.
In what follows, I describe someone as "having the talking stick" if he or she is the person who is acknowledged as the current speaker by the conversation participants.
More patterns of conversational narcissism that are associated with a sense of self-importance
To enhance their sense of self-importance, abusers can try compelling requests for enlightenment, playing advisor, playing teacher, infringing "internal copyright", disparaging others and their work, controlling the conversation focus, boasting, and complaining.
Descriptions of these patterns follow.
- Compelling requests for enlightenment
- Here are some techniques abusers can use for compelling auditors to ask for enlightenment:
- Use vocabulary, especially terms of art, that might be unfamiliar to auditors
- Use words rarely heard in conversation (examples: sedulous, propinquity, blandishment)
- Use acronyms or initialisms unfamiliar to auditors
- Use foreign words or phrases when a native construct would suffice (examples for English: ab initio, a posteriori, ipso facto, nom de plume, prima facie, schadenfreude)
- Using arcane terms, or terms used only by those of elevated stature, communicates to auditors that the abuser is also of elevated stature, and — what's more important — the auditors are not.
- Playing advisor
- By providing By providing advice not requested, conversation
participants place themselves in a one-up
position, well above their auditorsadvice not requested, abusers place themselves in the one-up position, and their auditors in the one-down position. This consolidates the abusers' views of their own self-importance. Condescension is a common adjunct to this stance. - Playing teacher
- A special case of playing advisor is playing teacher. In this pattern, the abuser corrects the usage, pronunciation, or grammar of the target. In an advanced form of the tactic, the abuser announces (possibly before witnesses) that he or she will be offering these corrections, "…because I know you won't mind learning something new today."
- Infringing "internal copyright"
- There is no "internal copyright" for contributions to workplace projects, but we do generally know the identities of contributors to important pieces of work. Abusers tend to believe that few co-workers produce any important work free of contributions by the abuser. Abusers are relentless advocates of this view, which they propagate by claiming sole credit for achievements of others.
- Disparaging others and their work
- Abusers do prepare for situations in which they cannot claim credit for all important work. When that happens, they disparage both the work in question and its author(s). Following their familiar pattern, they use any tools available to accomplish the disparagement, including raising objections, sowing doubts, questioning the motives of others, and misrepresenting the views of others (often unnamed). They usually offer these assertions without evidence, which they regard as unnecessary.
- Controlling the conversation focus
- When someone makes a contribution to the conversation, abusers employing this tactic jump in and make another contribution unrelated to what preceded it. This is a maneuver I call plopping. [Brenner 2003.1] Ideally, from the perspective of the abuser, the abuser's contribution brings the focus of conversation back to the abuser. The intent is to shift the conversation focus from the previous contribution onto the abuser's contribution. But when someone else treats the abuser's contribution that same way, i.e., when someone plops it, the abuser shifts the focus back to the abuser's contribution, a maneuver I call unplopping. Abusers sometimes repeatedly unplop the same contribution, if necessary, until all other participants surrender.
- Boasting
- To boast is to make exaggerated (and possibly unjustifiable or untrue) assertions about the superiority of one's accomplishments. Abusers use this tactic in conversation, of course. But they do so with multiple purposes. They want to shift focus to themselves, or disparage others or others' work, or consume conversation time, or any of the other tactics listed here.
- Complaining
- Registering complaints about situations unrelated to the conversation topic is one way to shift focus from the current topic. But complaining can also serve the other purposes described above. It directs attention to the abuser, it consumes conversation time, it can disparage the work of others, it can compel requests for explanations, and so on.
Last words
In the next post, I explore tactics abusers use that are associated with exploiting the other participants in the conversation. First issue in this series
Next issue in this series
Top
Next Issue
Is every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info
Footnotes
Your comments are welcome
Would you like to see your comments posted here? rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend me your comments by email, or by Web form.About Point Lookout
Thank you for reading this article. I hope you enjoyed it and
found it useful, and that you'll consider recommending it to a friend.
This article in its entirety was written by a human being. No machine intelligence was involved in any way.
Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.
Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.
Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.
Related articles
More articles on Effective Meetings:
Recovering Time: I
- Where do the days go? How can it be that we spend eight, ten, or twelve hours at work each day and get
so little done? To recover time, limit the fragmentation of your day. Here are some tips for structuring
your working day in larger chunks.
Why Don't They Believe Me?
- When we want people to believe us, and they don't, it just might be a result of our own actions or demeanor.
How does this happen?
Characterization Risk
- To characterize is to offer a description of a person, event, or concept. Characterizations are usually
judgmental, and usually serve one side of a debate. And they often make trouble.
Virtual Teams Need Generous Travel Budgets
- Although virtual team members who happen to be co-located do meet from time to time, meetings of people
who reside at different sites are often severely restricted by tight or nonexistent travel budgets.
Such restrictions, intended to save money, can contribute to expensive delays and errors.
When Your Boss Leaves Before You Do
- At some point in your career, your supervisor will leave his or her position and you'll end up reporting
to someone else. It can be a harrowing experience, even if you prepare. Nevertheless, preparation usually
produces a better outcome than winging it.
See also Effective Meetings and Effective Meetings for more related articles.
Forthcoming issues of Point Lookout
Coming February 26: Devious Political Tactics: Bad Decisions
- When workplace politics influences the exchanges that lead to important organizational decisions, we sometimes make decisions for reasons other than the best interests of the organization. Recognizing these tactics can limit the risk of bad decisions. Available here and by RSS on February 26.
And on March 5: On Begging the Question
- Some of our most expensive wrong decisions have come about because we've tricked ourselves as we debated our options. The tricks sometimes arise from rhetorical fallacies that tangle our thinking. One of the trickiest is called Begging the Question. Available here and by RSS on March 5.
Coaching services
I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.
Get the ebook!
Past issues of Point Lookout are available in six ebooks:
- Get 2001-2 in Geese Don't Land on Twigs (PDF, )
- Get 2003-4 in Why Dogs Wag (PDF, )
- Get 2005-6 in Loopy Things We Do (PDF, )
- Get 2007-8 in Things We Believe That Maybe Aren't So True (PDF, )
- Get 2009-10 in The Questions Not Asked (PDF, )
- Get all of the first twelve years (2001-2012) in The Collected Issues of Point Lookout (PDF, )
Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info
Follow Rick





Recommend this issue to a friend
Send an email message to a friend
rbrenjTnUayrCbSnnEcYfner@ChacdcYpBKAaMJgMalFXoCanyon.comSend a message to Rick
A Tip A Day feed
Point Lookout weekly feed
