Point Lookout: a free weekly publication of Chaco Canyon Consulting
Volume 23, Issue 41;   October 11, 2023: Self-Importance and Conversational Narcissism at Work: II

Self-Importance and Conversational Narcissism at Work: II

by

Self-importance is one of four major themes of conversational narcissism. Knowing how to recognize the patterns of conversational narcissism is a fundamental skill needed for controlling it. Here are eight examples that emphasize self-importance.
Men in conversation at an event

Men in conversation at an event. Can you tell who's speaking and who's listening? Image by Henri Mathieu-Saint-Laurent, courtesy Pexels.com.

This exploration of conversational narcissism began last time with some definitions and examples. Briefly, conversational narcissism is the set of behaviors a conversation participant uses to direct the focus of a conversation from the topic at hand onto that participant or along directions favored by that participant. Conversational narcissism is a threat to organizational wellbeing because it distorts the outcomes of discussions — biasing them in ways preferred by individuals whose personal agendas might not align with organizational interests.

The methods used can be categorized as emphasizing some combination of self-importance, exploitation of others, exhibitionism, and impersonal relationships. This post continues an exploration of the narcissistic behaviors that are most closely associated with the abuser's sense of self-importance.

As explained last time, I use the term abuser as a shorthand for narcissistic conversation participant, because the term narcissist won't do — not all abusers are narcissists. And I described five ploys abusers use and which are associated with a sense of self-importance of the abuser.

In what follows, I describe someone as "having the talking stick" if he or she is the person who is acknowledged as the current speaker by the conversation participants.

More patterns of conversational narcissism that are associated with a sense of self-importance

To enhance their sense of self-importance, abusers can try compelling requests for enlightenment, playing advisor, playing teacher, infringing "internal copyright", disparaging others and their work, controlling the conversation focus, boasting, and complaining.

Descriptions of these patterns follow.

Compelling requests for enlightenment
Here are some techniques abusers can use for compelling auditors to ask for enlightenment:
  • Use vocabulary, especially terms of art, that might be unfamiliar to auditors
  • Use words rarely heard in conversation (examples: sedulous, propinquity, blandishment)
  • Use acronyms or initialisms unfamiliar to auditors
  • Use foreign words or phrases when a native construct would suffice (examples for English: ab initio, a posteriori, ipso facto, nom de plume, prima facie, schadenfreude)
Using arcane terms, or terms used only by those of elevated stature, communicates to auditors that the abuser is also of elevated stature, and — what's more important — the auditors are not.
Playing advisor
By providing By providing advice not requested, conversation
participants place themselves in a one-up
position, well above their auditors
advice not requested, abusers place themselves in the one-up position, and their auditors in the one-down position. This consolidates the abusers' views of their own self-importance. Condescension is a common adjunct to this stance.
Playing teacher
A special case of playing advisor is playing teacher. In this pattern, the abuser corrects the usage, pronunciation, or grammar of the target. In an advanced form of the tactic, the abuser announces (possibly before witnesses) that he or she will be offering these corrections, "…because I know you won't mind learning something new today."
Infringing "internal copyright"
There is no "internal copyright" for contributions to workplace projects, but we do generally know the identities of contributors to important pieces of work. Abusers tend to believe that few co-workers produce any important work free of contributions by the abuser. Abusers are relentless advocates of this view, which they propagate by claiming sole credit for achievements of others.
Disparaging others and their work
Abusers do prepare for situations in which they cannot claim credit for all important work. When that happens, they disparage both the work in question and its author(s). Following their familiar pattern, they use any tools available to accomplish the disparagement, including raising objections, sowing doubts, questioning the motives of others, and misrepresenting the views of others (often unnamed). They usually offer these assertions without evidence, which they regard as unnecessary.
Controlling the conversation focus
When someone makes a contribution to the conversation, abusers employing this tactic jump in and make another contribution unrelated to what preceded it. This is a maneuver I call plopping. [Brenner 2003.1] Ideally, from the perspective of the abuser, the abuser's contribution brings the focus of conversation back to the abuser. The intent is to shift the conversation focus from the previous contribution onto the abuser's contribution. But when someone else treats the abuser's contribution that same way, i.e., when someone plops it, the abuser shifts the focus back to the abuser's contribution, a maneuver I call unplopping. Abusers sometimes repeatedly unplop the same contribution, if necessary, until all other participants surrender.
Boasting
To boast is to make exaggerated (and possibly unjustifiable or untrue) assertions about the superiority of one's accomplishments. Abusers use this tactic in conversation, of course. But they do so with multiple purposes. They want to shift focus to themselves, or disparage others or others' work, or consume conversation time, or any of the other tactics listed here.
Complaining
Registering complaints about situations unrelated to the conversation topic is one way to shift focus from the current topic. But complaining can also serve the other purposes described above. It directs attention to the abuser, it consumes conversation time, it can disparage the work of others, it can compel requests for explanations, and so on.

Last words

In the next post, I explore tactics abusers use that are associated with exploiting the other participants in the conversation. First in this series  Next in this series Go to top Top  Next issue: Exploitation and Conversational Narcissism at Work: I  Next Issue

303 Secrets of Workplace PoliticsIs every other day a tense, anxious, angry misery as you watch people around you, who couldn't even think their way through a game of Jacks, win at workplace politics and steal the credit and glory for just about everyone's best work including yours? Read 303 Secrets of Workplace Politics, filled with tips and techniques for succeeding in workplace politics. More info

Footnotes

Comprehensive list of all citations from all editions of Point Lookout
[Brenner 2003.1]
Richard Brenner. "Plopping," Point Lookout blog, October 22, 2003. Available here. Back

Your comments are welcome

Would you like to see your comments posted here? rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.comSend me your comments by email, or by Web form.

About Point Lookout

This article in its entirety was written by a 
          human being. No machine intelligence was involved in any way.Thank you for reading this article. I hope you enjoyed it and found it useful, and that you'll consider recommending it to a friend.

This article in its entirety was written by a human being. No machine intelligence was involved in any way.

Point Lookout is a free weekly email newsletter. Browse the archive of past issues. Subscribe for free.

Support Point Lookout by joining the Friends of Point Lookout, as an individual or as an organization.

Do you face a complex interpersonal situation? Send it in, anonymously if you like, and I'll give you my two cents.

Related articles

More articles on Effective Meetings:

Sleeping ducksAppreciate Differences
In group problem solving, diversity of opinion and healthy, reasoned debate ensure that our conclusions take into account all the difficulties we can anticipate. Lock-step thinking — and limited debate — expose us to the risk of unanticipated risk.
A single-strand knotTangled Thread Troubles
Even when we use a facilitator to manage a discussion, managing a queue for contributors can sometimes lead to problems. Here's a little catalog of those difficulties.
Marching chickens, a metaphor for groupthinkWhat Groupthink Isn't
The term groupthink is tossed around fairly liberally in conversation and on the Web. But it's astonishing how often it's misused and misunderstood. Here are some examples.
Truth and LiesBarriers to Accepting Truth: I
In workplace debates, a widely used strategy involves informing the group of facts or truths of which some participants seem to be unaware. Often, this strategy is ineffective for reasons unrelated to the credibility of the person offering the information. Why does this happen?
Eurasian cranes migrating to Meyghan Salt Lake, Markazi Province of IranOn Schedule Conflicts
Schedule conflicts happen from time to time, even when the organization is healthy and all is well. But when schedule conflicts are common, they might indicate that the organization is trying to do too much with too few people.

See also Effective Meetings and Workplace Politics for more related articles.

Forthcoming issues of Point Lookout

What a videoconference looks like when all participants have their cameras offComing December 6: Off-Putting and Conversational Narcissism at Work: III
Having off-putting interactions is one of four themes of conversational narcissism. Here are seven behavioral patterns that relate to off-putting interactions and how abusers use them to control conversations. Available here and by RSS on December 6.
Lifeboats on board the FS Scandinavia, May 2006And on December 13: Contrary Indicators of Psychological Safety: I
To take the risks that learning and practicing new ways requires, we all need a sense that trial-and-error approaches are safe. Organizations seeking to improve processes would do well to begin by assessing their level of psychological safety. Available here and by RSS on December 13.

Coaching services

I offer email and telephone coaching at both corporate and individual rates. Contact Rick for details at rbrenogMhuqCxAnbfLvzbner@ChacigAthhhYwzZDgxshoCanyon.com or (650) 787-6475, or toll-free in the continental US at (866) 378-5470.

Get the ebook!

Past issues of Point Lookout are available in six ebooks:

Reprinting this article

Are you a writer, editor or publisher on deadline? Are you looking for an article that will get people talking and get compliments flying your way? You can have 500-1000 words in your inbox in one hour. License any article from this Web site. More info

Follow Rick

Send email or subscribe to one of my newsletters Follow me at LinkedIn Follow me at Twitter, or share a tweet Subscribe to RSS feeds Subscribe to RSS feeds
The message of Point Lookout is unique. Help get the message out. Please donate to help keep Point Lookout available for free to everyone.
Technical Debt for Policymakers BlogMy blog, Technical Debt for Policymakers, offers resources, insights, and conversations of interest to policymakers who are concerned with managing technical debt within their organizations. Get the millstone of technical debt off the neck of your organization!
Go For It: Sometimes It's Easier If You RunBad boss, long commute, troubling ethical questions, hateful colleague? Learn what we can do when we love the work but not the job.
303 Tips for Virtual and Global TeamsLearn how to make your virtual global team sing.
101 Tips for Managing ChangeAre you managing a change effort that faces rampant cynicism, passive non-cooperation, or maybe even outright revolt?
101 Tips for Effective MeetingsLearn how to make meetings more productive — and more rare.
Exchange your "personal trade secrets" — the tips, tricks and techniques that make you an ace — with other aces, anonymously. Visit the Library of Personal Trade Secrets.
If your teams don't yet consistently achieve state-of-the-art teamwork, check out this catalog. Help is just a few clicks/taps away!
Ebooks, booklets and tip books on project management, conflict, writing email, effective meetings and more.